EP4061549A1 - Procédé et système de destruction à la demande et mobile de supports de données dans des véhicules de collecte - Google Patents

Procédé et système de destruction à la demande et mobile de supports de données dans des véhicules de collecte

Info

Publication number
EP4061549A1
EP4061549A1 EP20806984.9A EP20806984A EP4061549A1 EP 4061549 A1 EP4061549 A1 EP 4061549A1 EP 20806984 A EP20806984 A EP 20806984A EP 4061549 A1 EP4061549 A1 EP 4061549A1
Authority
EP
European Patent Office
Prior art keywords
destruction
data carriers
control device
security level
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP20806984.9A
Other languages
German (de)
English (en)
Inventor
Michael Erich SCHUBERT
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Reisswolf Akten und Datenvernichtung & Co Kg GmbH
Original Assignee
Reisswolf Akten und Datenvernichtung & Co Kg GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Reisswolf Akten und Datenvernichtung & Co Kg GmbH filed Critical Reisswolf Akten und Datenvernichtung & Co Kg GmbH
Publication of EP4061549A1 publication Critical patent/EP4061549A1/fr
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B02CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
    • B02CCRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
    • B02C18/00Disintegrating by knives or other cutting or tearing members which chop material into fragments
    • B02C18/0007Disintegrating by knives or other cutting or tearing members which chop material into fragments specially adapted for disintegrating documents
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B02CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
    • B02CCRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
    • B02C21/00Disintegrating plant with or without drying of the material
    • B02C21/02Transportable disintegrating plant
    • B02C21/026Transportable disintegrating plant self-propelled
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B02CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
    • B02CCRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
    • B02C23/00Auxiliary methods or auxiliary devices or accessories specially adapted for crushing or disintegrating not provided for in preceding groups or not specially adapted to apparatus covered by a single preceding group
    • B02C23/18Adding fluid, other than for crushing or disintegrating by fluid energy
    • B02C23/20Adding fluid, other than for crushing or disintegrating by fluid energy after crushing or disintegrating
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B09DISPOSAL OF SOLID WASTE; RECLAMATION OF CONTAMINATED SOIL
    • B09BDISPOSAL OF SOLID WASTE NOT OTHERWISE PROVIDED FOR
    • B09B3/00Destroying solid waste or transforming solid waste into something useful or harmless
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B09DISPOSAL OF SOLID WASTE; RECLAMATION OF CONTAMINATED SOIL
    • B09BDISPOSAL OF SOLID WASTE NOT OTHERWISE PROVIDED FOR
    • B09B3/00Destroying solid waste or transforming solid waste into something useful or harmless
    • B09B3/20Agglomeration, binding or encapsulation of solid waste
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B09DISPOSAL OF SOLID WASTE; RECLAMATION OF CONTAMINATED SOIL
    • B09BDISPOSAL OF SOLID WASTE NOT OTHERWISE PROVIDED FOR
    • B09B5/00Operations not covered by a single other subclass or by a single other group in this subclass
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B30PRESSES
    • B30BPRESSES IN GENERAL
    • B30B9/00Presses specially adapted for particular purposes
    • B30B9/30Presses specially adapted for particular purposes for baling; Compression boxes therefor
    • B30B9/3003Details
    • B30B9/3007Control arrangements
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B30PRESSES
    • B30BPRESSES IN GENERAL
    • B30B9/00Presses specially adapted for particular purposes
    • B30B9/30Presses specially adapted for particular purposes for baling; Compression boxes therefor
    • B30B9/3003Details
    • B30B9/3035Means for conditioning the material to be pressed, e.g. paper shredding means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B02CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
    • B02CCRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
    • B02C18/00Disintegrating by knives or other cutting or tearing members which chop material into fragments
    • B02C18/0007Disintegrating by knives or other cutting or tearing members which chop material into fragments specially adapted for disintegrating documents
    • B02C2018/0061Disintegrating by knives or other cutting or tearing members which chop material into fragments specially adapted for disintegrating documents with compacting devices for the disintegrated material
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65FGATHERING OR REMOVAL OF DOMESTIC OR LIKE REFUSE
    • B65F2210/00Equipment of refuse receptacles
    • B65F2210/128Data transmitting means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B65CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
    • B65FGATHERING OR REMOVAL OF DOMESTIC OR LIKE REFUSE
    • B65F2210/00Equipment of refuse receptacles
    • B65F2210/148Locking means

Definitions

  • the invention relates to a method for the needs-based and mobile destruction of data carriers in collection vehicles according to the preamble of claim 1 and systems of lockable individual containers for throwing in and receiving data carriers with confidential content and a mobile collection vehicle with a collection container according to the preamble of claim 13.
  • Such methods and systems are used for the reliable and confidential destruction of data carriers and such methods and systems are regularly used in the provision of destruction services.
  • Such destruction services are regularly used by clients who produce data on data carriers that are not destroyed by the client himself, but by a service company commissioned to do so.
  • Recyclable containers for glass, paper and plastic are decentralized in order to achieve a high usage rate. Since the reusable materials are recycled centrally, the contents of the container must be transported to a collection point. This is usually done with trucks that are equipped with collecting bins into which the contents of the individual recycling containers can be emptied.
  • the situation is different when disposing of confidential business papers or other data carriers with confidential content, which is the subject of the present invention.
  • data carrier primarily refers to paper-based data carriers or, more generally, to fiber-based data carriers, but basically also includes other data carriers, especially since data is increasingly being stored, processed and sent digitally. In this respect, it is also about the destruction of data carriers which data is stored in digital form. Nevertheless, the invention is explained and described in more detail below and in the exemplary embodiments primarily with regard to paper-based data carriers, but this is not intended to restrict the invention.
  • Paper-based data carriers are to be considered as an example of data carriers only, albeit as a preferred example.
  • security levels e.g. P4 or PI
  • Such data carriers especially paper-based data carriers, occur in companies, medical practices, law offices, freelancers, etc. (hereinafter generally referred to as clients) e.g. at certain times in larger quantities, for example when the retention period for certain documents has expired.
  • clients Such data carriers are also used in daily work.
  • the data carriers must be reliably destroyed to prevent unauthorized third parties from looking at them and to protect the confidentiality of information.
  • the client does not normally carry out the destruction themselves, but instead instructs specialized companies, hereinafter referred to as destruction service providers.
  • the client expects his data carriers to be destroyed while maintaining the necessary confidentiality.
  • the destruction service providers can guarantee confidentiality within their company.
  • the service relationship between the client and the destruction service provider of the data carrier destruction usually looks like that the client receives locked individual containers from the destruction service provider into which he can insert his data carriers. For logistical reasons, the contents of these individual containers are transferred to large collecting containers and then, according to the state of the art, brought to a central destruction site, for example. When emptying the individual containers into the collecting container, there is a risk that unauthorized third parties can inspect the papers to be destroyed, that papers are stolen or lost.
  • WO 01/96215 A1 This is where WO 01/96215 A1 comes in. From this WO 01/96215 A1 a system consisting of lockable individual containers and a collecting container for emptying such individual containers is known.
  • the lockable individual containers are usually part of a destruction service and are available from a client so that he can throw confidential papers or other data carriers into the individual containers, because disposal via other, general recycling systems with regard to confidentiality is out of the question.
  • These lockable individual containers are emptied by the destruction service provider as part of the service relationship and for this purpose the destruction service provider operates collection vehicles with collection containers arranged on them.
  • WO 01/962151 A1 describes such a system consisting of lockable individual containers and a mobile collecting container for emptying such individual containers. The mobile collection containers only have a collecting function and the collected goods with confidential data are then brought to a place where the collected goods are destroyed.
  • WO 01/96215 A1 deals with how the lockable individual containers can be emptied into the mobile collecting container without the possibility of external access, in particular by unauthorized third parties, to the contents of the lockable individual containers during emptying into the collecting container.
  • each individual container can only be opened if it is completely enclosed by the collecting container.
  • the emptying takes place in a lock of the collecting container. This represents a significant improvement over systems in which filled, lockable individual containers are exchanged for empty, lockable individual containers and then the replaced filled individual containers are brought to the location where the collected goods with confidential data are reliably destroyed.
  • a mobile device for the destruction of data carriers is disclosed, for example, in DE 600 24 912 T2.
  • the mobile device shown there consists of a cutting device in which, for example, the paper fed to the cutting device via a funnel is shredded. This shredded paper arrives in a screw arranged below the cutting device and is mixed there and pressed into a collecting compartment which is separated by a wall and at a distance from the cutting device and the funnel.
  • DE 30 25 631 A1 describes a stationary system and a stationary method for the destruction of data carriers.
  • the data carriers to be destroyed are to be fed to several processing stages of the system, namely one after the other to a mechanical coarse crushing stage, a magnetic separation stage, a fine crushing stage and a grinding stage.
  • the data carriers should come out of the system in micro-granulated form.
  • No. 6,491,245 B1 shows a mobile shredding device for the mobile destruction of data carriers.
  • the destruction takes place via a shredder, a sieve device and a screw compactor.
  • the data carriers destroyed in this way are then placed in a collection compartment.
  • spray nozzles are arranged on the roof side in order to be able to spray dust-binding liquid down from the ceiling for the purpose of binding dust.
  • DE 22 14 786 B2 shows methods and devices for the stationary destruction of data carriers.
  • the data carriers to be destroyed are first mechanically shredded and then pressed to reduce their volume.
  • the scaled-down data carriers are moistened, for example by adding water in a liquid or vapor state. By moistening the material, a particularly good compression, an improved rendering of the data illegible and a stabilization of the resulting compacts should be achieved.
  • EP 0289 015 A1 discloses a screw press and method for converting waste paper into manageable compacts, this waste paper not being a data carrier with confidential content but, for example, conventional paper, i.e. a conventional material that is recycled.
  • the screw press has a nozzle in the area of the screw for the supply of liquid. A good and uniform wetting of the waste paper with the liquid should be ensured so that the waste paper can be well bonded during the pressing process in the screw press when it is formed into compacts.
  • WO 2014/131593 A1 describes a mobile device by means of which a mobile data carrier destruction method can be carried out.
  • the data carriers are to be destroyed on the collection vehicle used, whereby the data carriers are not shredded. Rather, these should be mixed in a hydromechanical pulper to form a suspension of fiberized data carriers and pulping fluid. This resulting suspension should then be fed to a paper recycling plant.
  • WO 2016/070948 A1 describes a stationary system for the destruction of data carriers.
  • the data carriers are crushed in a crushing step by a hammer mechanism and then water is added to the particles that are formed. A crumbly residue is no longer legible. It is proposed that the water be added before the comminution or during the comminution in the hammer mechanism, since this allows the friction values in the hammer mechanism to be reduced.
  • JP 2014/018715 A shows a mobile device and a mobile method for the destruction of data carriers. Packets are manually entered into the destruction device. The packets are subjected to a shredding step and then ground up. Liquid is added in the milling step.
  • the destruction method which is applied to the collected data carriers is carried out in a controlled manner by a control device according to a first method sequence.
  • the collected data carriers are to be destroyed in the collection vehicle after a first security level.
  • the control device can switch from this first method sequence to a second method sequence. This is done as required and in this second process sequence, the collected data carriers are to be destroyed according to a second security level that is higher than the first security level.
  • security level is used in this application, this term refers to DIN 66399, which has replaced the previous DIN 32759.
  • This DIN 66399 standard deals with various data carriers, for example those with information displayed in original size, for example paper, films, printing plates.
  • This type of data carrier is abbreviated with the letter "P”.
  • Data carriers with reduced information display, for example microfilms, foil are abbreviated with the letter “F”.
  • Optical data carriers, for example CDs / DVDs are abbreviated with the letter “O”.
  • Magnetic data carriers, for example ID cards, floppy disks are abbreviated with the letter "T”
  • hard drives with magnetic data carriers are abbreviated with the letter "H”
  • Electronic data carriers, for example memory sticks, chip cards are abbreviated with the letter "E”.
  • Protection classes are defined in this DIN 66399 and security levels 1-7 are assigned to these protection classes. The following table shows a comparison of the protection classes with the security levels. This table is taken from the said DIN.
  • This DIN 66399 also contains specific information on when and with respect to which material the security level shown above is reached.
  • Several tables are given in Part 2 of this DIN, one for each of the material classes P, F, O, T, H, E.
  • the table for material class P is shown below.
  • security level P1 has been achieved, which is recommended for data carriers with general data that are to be made illegible if a material particle area of ⁇ 2000 mm 2 or a strip width of ⁇ 12 mm is achieved in the context of the destruction of the data carrier.
  • the security levels P2 to P7 are referred to as higher security levels and the requirements for the destruction process increase in order to achieve destruction according to these higher security levels.
  • DIN 66399 specifies for security level P4 that this is recommended for data carriers with particularly sensitive and confidential data and is achieved when the material particle area is ⁇ 160 mm 2 and for regular particles a strip width of ⁇ 6 mm and for Example a particle size of ⁇ 4 mm c 40 mm is achieved.
  • the highest security level is P7, which is recommended, for example, for data carriers with data that are to be kept strictly confidential, i.e. when the highest security precautions must be observed.
  • DIN 66399 also provides specifications for this. After this highest security level, the destruction of the data carriers takes place in such a way that the reproduction of the data reproduced on them is impossible according to the state of the art in science and technology.
  • the prior art would require that a destruction process according to security level P7 be carried out in the collection vehicle in order to use such collection vehicles to carry out both orders for destruction according to security level P4 and orders for destruction with security level P7 on the same vehicle to be able to.
  • Such a procedure would be economically disadvantageous for customer orders that provide for destruction according to security level P4 and for which only a service fee for such a security level can be agreed.
  • the present invention brings about an improvement, because with the method according to the invention and with the system according to the invention it is possible to change from a first method sequence of destruction to a second method sequence of destruction, for example from a first method sequence, which is controlled by a control device leads to destruction according to security level P4, to a second process sequence which, for example, leads to destruction according to security level P7.
  • orders for destruction can be carried out reliably and economically according to different security levels, without an additional post-destruction process, for example, as described above, and without any precautionary measures Orders for destruction with a lower security level must be carried out according to a procedure with a higher security level, without this being economically burdensome for the client.
  • the destruction method has at least one comminution step.
  • comminution steps can also be provided, for example a first coarse comminution and a subsequent fine comminution.
  • the destruction process includes further procedural steps.
  • a sieving step or several sieving steps could be provided with one or more sieves with a predefined sieve hole size.
  • the destruction device is activated by a control device to work in a first operating mode. In this first operating mode, the emptied data carriers are destroyed after one first destruction method and after a first security level, as explained above, for example using the destruction method according to the invention.
  • control device can operate the destruction device in a second operating mode, namely when destruction is to take place according to a different security level than in the first operating mode.
  • the destruction method comprises at least one further treatment step in addition to the comminution step, this treatment step meaning a treatment of the collected data carriers.
  • This further treatment step should preferably be carried out in the second method sequence or in the second operating mode and not be carried out in the first operating mode or in the first method sequence.
  • this further treatment step means that destruction does not take place after the first security level, but rather after the second, higher security level.
  • This second treatment step could, for example, be a screening step and / or a mixing or swirling step and / or a further comminution step and / or a material compression step.
  • this further treatment step can also be designed differently.
  • the further treatment step could be a swirling step, for example in a fall section, while for material of material classification H this second treatment step could be a further comminution step or a grinding step.
  • the application of a liquid to the emptied data carriers is regarded as a preferred further treatment step.
  • This application should preferably take place after the disintegration of the data carrier.
  • a corresponding charge device would be to be arranged behind the shredding device in the conveying direction of the data carrier.
  • This application could preferably take place from suitably arranged nozzles and in atomized form.
  • the application liquid used is preferably water, which is preferred over other liquids in terms of handling, health and environmental compatibility.
  • a liquid tank is advantageously arranged in the collecting vehicle, from which the liquid is withdrawn in order to act on the emptied data carrier. Such a liquid tank can be arranged, for example, in a manner that is favorable for the vehicle's center of gravity.
  • an indicator can be added to the liquid, for example a dye, so that the exposure of the data carrier to the liquid can be detected using the indicator.
  • the indicator could easily be used to recognize that a destruction process is being carried out according to a higher security level, while if the indicator does not work, a destruction process according to the lower security level can be recognized.
  • the amount of liquid to be discharged can be made dependent, for example, in a controlled manner on the amount of data carrier material being destroyed. The amount of liquid should be measured in such a way that the impacted data carriers are reliably made illegible, as required by the security level to be achieved.
  • control device has a wireless communication device.
  • the control device can exchange (send and / or receive) data via this wireless communication device, and on the basis of received data it is advantageously selected which destruction method is to be used on the emptied data carriers. In this way, the destruction method to be used can be selected automatically, without an operator having to make an entry, for example on the collection vehicle or on the collection container.
  • the wireless communication device can communicate wirelessly with the electronically actuated lock and it could be stored in the electronically actuated lock, for example, according to which security level the data carriers inserted there should be destroyed.
  • the wireless communication device could read out this stored information and then let the control device run the appropriate destruction process provided for this security level.
  • the wireless communication device could communicate wirelessly with a stationary central control device.
  • this central control device can be used, for example, to control and manage the services provided and to be provided by the destruction service provider, e.g. contain information on the clients and their security level requirements, and, for example, control and manage the collection vehicles of the fleet.
  • the central control device could be stored in a memory of this central control device or in a memory that the central control device can access, with which client and / or which individual container which destruction process is to be carried out according to which security level.
  • the wireless communication device could therefore receive information from the central control device that a specific security level is stored for a specific and clearly identifiable electronic lock and thus a destruction process is to be carried out according to a specific security level.
  • the advantage of such a central storage of this information would be that central data maintenance is possible.
  • the wireless communication device can communicate wirelessly with a device that is operated by the Client is served.
  • a device that is operated by the Client could be a mobile telecommunication device, for example a common smartphone.
  • a device can also be a remote control device which, for example, can have been made available to the client by the service provider.
  • Such a device can, however, also be a computer device of the usual type, for example a tablet, a laptop or a PC, via which the client can communicate with the wireless communication device.
  • the wireless communication device of the control device is used to transmit information on the destruction process to the devices operated by the client.
  • This can be, for example, status reports on the process sequence, for example that the process is starting, that certain intermediate steps have been completed and / or that the process has been ended.
  • the transmitted information can also be, for example, images or video recordings, for example images or video recordings recorded by suitably positioned cameras, for example to record the emptying of the container in the image and / or the crushing of the emptied data carriers and / or images or video recordings further processing steps. If, for example, a liquid is applied to the emptied data carrier, a message could be issued about this, for example.
  • a picture or video recording of the final state of the destroyed data carrier at the end of the destruction process could be transmitted.
  • the client has the opportunity to observe and / or understand the destruction process.
  • a destruction certificate could also be transmitted and / or information about the security level after which destruction is to be carried out could be transmitted before the destruction process is started.
  • Another or alternative advantageous possibility is that, for example, the destruction process is only carried out when the client has previously given a release signal via the device operated by him. In this way, the client retains control over whether a destruction procedure or that a destruction procedure is carried out.
  • the destruction process is aborted or changed if the client gives an abort signal or a change signal via the device operated by him. This is how it is, for example It is possible that the client will first be notified that a destruction procedure should be carried out according to a certain security level. He can then, for example, enter the destruction according to a different security level and the control device would then carry out the destruction according to this changed security level by running a destruction process corresponding to this security level. It is also conceivable that the client cancels the destruction process by sending an interruption signal.
  • the destruction process comprises a compaction step, this compaction being carried out, for example, by means of compaction screws. It is considered advantageous here that the liquid is added before and / or during the compression step. This opens up the possibility, on the one hand, of achieving particularly good compression and, on the other hand, of distributing the liquid well over the already reduced data carriers.
  • FIG. 1 shows a basic representation of a system according to the invention and a method according to the invention
  • 2a shows a schematic flow diagram of various process steps in the collection and emptying of individual containers in a collection container of a collection vehicle
  • FIG. 2b shows a schematic flow diagram for a destruction method according to the invention according to a first method sequence and a second method sequence with additional method steps compared to the first method sequence;
  • 3a, 3b, 3c different perspective representations of a collection vehicle with a collection container and with destruction devices for carrying out the method according to the invention according to an embodiment
  • 4 a basic representation of possible control processes and possible information exchange between communication and control devices according to a method according to the invention and in a system according to the invention.
  • FIG. 1 shows a customary sequence of a destruction service.
  • the destruction service provider operates collection vehicles 10 which are equipped with a collection container 12.
  • devices (not shown in FIG. 1) are to be provided in the collecting vehicle 10 which enable the collected data carriers 14 to be destroyed. Details of these destruction facilities and details of such destruction methods are explained in connection with later figures.
  • the collection vehicle 10 works together with individual containers 16 which are designed to be lockable, for example preferably with electronic locks. These individual containers 16 are, for example, with a client A, and with this client A these individual containers 16 are filled with data carriers 14, for example with paper or paper-based documents.
  • a collection vehicle 10 is sent to client A at regular intervals or on request.
  • the filled individual containers 16 located at the client A are brought to the collecting vehicle 10, emptied into the collecting container 12 on or in the collecting vehicle 10, subjected to destruction as will be explained and the emptied individual containers 16 then returned to the client A so that he can dispose of the individual containers 16 can be used again for the purpose of filling with data carriers 14 that arise at client A.
  • the collection vehicle 10 is equipped with a maximum storage capacity due to its space and design, ie the storage volume of emptied data carriers 12 and shredded or destroyed data carriers 14 is limited by the available loading volume.
  • the collection vehicle 10 must therefore regularly drive to a central collection point 18, for example when the loading limit is reached or at the end of the planned collection route.
  • This can be a recycling system, for example, in order to feed the destroyed data carriers 14 to a recycling process there.
  • this can also be a central station of the destruction service provider in order to remove the collected and destroyed data carrier 14 initially to receive centrally, if necessary to be subjected to further processing, for example to enable a subsequent recycling of the collected data carrier material.
  • the emptied collection vehicle 10 can then approach customer A again and pick up individual containers 16 for the purpose of emptying them.
  • FIG. 2a explains in a schematic flow diagram which method steps are generally carried out on the collecting vehicle 10 in order to empty an individual container 16 into the collecting vehicle 10 and into the collecting container 12 arranged in the collecting vehicle.
  • the individual container 16 collected by a client A is first brought to the collection vehicle 10.
  • the collection vehicle 10 is equipped with a lifting and emptying device 22.
  • the still closed individual container 16 is placed in this lifting device 22.
  • the individual container 16 is regularly fixed there so that it is securely held when it is lifted and emptied.
  • the access to the individual container 16 can be blocked 24 (lock 24), for example.
  • the lifting device 22 starts moving 26 and lifts the individual container 16 that has been picked up into an emptying position.
  • the closing device of the individual container 16 is opened 28. If this closing device is, for example, an electronically actuated lock, an opening actuation signal can be emitted at this point in time. In the case of mechanical locks as the locking device, mechanical unlocking can take place, for example.
  • the contents of the individual container 16 are emptied 28, for example into a funnel 34 of the collecting container 12.
  • the cover of the individual container 16 can, for example, pivot open.
  • an opening container bottom is provided. Opening lids are more common.
  • the collected contents of the individual container 16 are emptied into the opening provided for this purpose, for example a funnel 34 of a collecting container 12.
  • the individual container 16 After complete emptying 28, the individual container 16 is moved back from the emptying position into a removal position or into its starting position 30.
  • the locking device or the lock is closed again and the Closed and emptied individual containers 16 can then be removed from the collecting vehicle 10, if necessary after the blocking of the access 24 has been removed.
  • the first step of the destruction process 32 can be carried out in the collecting vehicle 10.
  • this first method step of the destruction method 32 is only carried out when the individual container 16 has been removed from the lock 24, for example.
  • this first method step of the destruction method 32 is only carried out when the individual container 16 has been removed from the lock 24, for example.
  • the destruction process starts during the emptying process in order to process the emptied data carrier material immediately.
  • FIG. 2b shows a schematic flow chart of a method 32 according to the invention for mobile destruction of data carriers 14 as required and which is carried out, for example, by the system according to the invention and with the system according to the invention.
  • the actual destruction process 32 begins after an individual container 16 has been emptied 28 into the collecting container 12, for example into the funnel 34 of such a collecting container 12, i.e. the steps for emptying an individual container explained above for FIG. 2a are not regarded as part of the destruction process.
  • the data carrier material recorded in this way is first subjected to a shredding step 36.
  • This first shredding step 36 can be, for example, a pre-shredding step in order to first roughly shred the data carriers 14.
  • This first reduction step 36 can be followed, for example, by a sieving step 38a, and depending on the data carrier material also a separation step, for example a step in which metallic fractions are removed. If a multi-stage comminution is provided, a further comminution can take place, for example a fine comminution 36a, and this fine comminution 36a can be followed, for example, by a further sieving step 38b. In this optionally provided first and second screening step 38a, 38b, screens with different hole diameters are used, for example.
  • a further method step of the example shown for a destruction method 32 consists of a so-called compression 40.
  • compression 40 This is to be understood as meaning that the data carrier material arriving at the compression step 40 is compressed under an external pressure.
  • one or more compression screws 42 can be used, which are also fundamentally known in the prior art. These compression screws 42 can, for example, at the same time Arrange for the transport of the data carrier material to a collecting compartment 44, where the destroyed data carrier material is stored in the collecting container 12, in order to then be emptied, for example, at a recycling plant 18 or on the premises of the destruction service provider.
  • the destruction process 32 described above could, for example, be the first destruction process performed in the collection container 12. However, this first destruction process does not have to include all of the process steps described above. It is only necessary that at least one comminution step 36 take place. This first destruction process leads to the destruction of the data carriers 14 after a first security level. Depending on the data carrier material, this first security level could be level P4 or other levels of security level 4 (04, H4, etc.).
  • the collection vehicle 10 can not only carry out a destruction process to achieve this first security level, but also, controlled by a control device 46, the destruction process 32 can be carried out in a modified form, namely by adding a further processing step.
  • this further processing step should consist in adding a liquid 48 to the data carrier material. It is possible, for example, for the liquid to be added to the data carrier material after the comminution step 36, in that, for example, a device for adding a suitable liquid 48 is arranged downstream of the outlet of the first comminution stage 36. This device can be, for example, one or more nozzles in order to spray the data carrier material with a liquid.
  • the liquid is additionally or alternatively possible for the liquid to be added following a further comminution step 36a or following a first or second sieving step 38a, 38b.
  • the liquid 48 is additionally or alternatively also possible for the liquid 48 to be supplied during the compression step 40.
  • the corresponding compression screw 42 could be equipped with outlet openings for such a liquid 48 arranged in the screw housing.
  • the added liquid 48 could be, for example, water that is stored in a liquid tank 50 arranged in the collecting vehicle 10, for example.
  • FIGS. 3a to 3c show different views of a collecting container 12 of a collecting vehicle 10.
  • the tractor 52 of the collecting vehicle 10 is not shown.
  • the collecting container 12 consists of a chassis with a running gear, and a substantially box-shaped structure is provided on this chassis.
  • This box-shaped structure has a pivotable or openable flap 54 at the rear in order to provide rear access to the collecting container 12, namely to a lock 24.
  • the supply of the individual containers 16 is to take place at the rear.
  • access is from the side. The following description based on a rear access is not restrictive of the invention.
  • the collecting container 12 has a pivotable roof area on the rear and roof side in order to provide additional height freedom in the area of the lock 24 for emptying an individual container. This makes it possible for the collecting container 12 to maintain a normal overall height and no problems arise due to a particularly high construction, for example when crossing under bridges etc.
  • the collecting container 12 can have a lifting and emptying device 22, as it is also already fundamentally known in the prior art.
  • this lifting device 22 is equipped with an individual container 16, lifts this individual container 16 in a secured and fixed manner into an emptying position and empties the contents of the container into the collecting container 12 after opening the emptying opening, for example the closed lid of the individual container 16 into it.
  • the individual container 16 can also be opened and closed as in the prior art, so that no detailed description is required for this either.
  • the emptied data carriers 14 fall, for example, into a funnel 34 and pass from there into a first shredding device 36.
  • Both the funnel 34 and the shredding device 36 are part of the destruction device, which are arranged in the collecting vehicle 10 or in the collecting container 10, in order to remove empty data carriers 14 immediately to be subjected to a destruction procedure 32.
  • the collecting vehicle 10 has supply devices 56 in order to be able to operate these mentioned devices.
  • These supply facilities represent electrical, hydraulic and / or pneumatic energy available. It can be a power generator, for example. However, it is also possible to take the required energy from the drive motor of the collecting vehicle 10. This, too, is basically already known in the prior art and therefore does not require a detailed description.
  • the collecting compartment 44 is arranged at a distance from the destruction device 34, 36, in which the data carriers 14 destroyed according to a destruction process 32 are brought and stored until this compartment 44 is emptied.
  • the connection between this collecting compartment 44 and the destruction device 34, 36 takes place via compression screws 42, which can be seen better in FIG. 3b, which compress the data carrier material processed according to a destruction process 32 and convey it into the collecting compartment 44.
  • the destruction device also has devices for adding a liquid 48 carried along in the collecting container 12 to the data carrier material.
  • the liquid tank 50 provided for carrying along the liquid 48 is shown in FIG. 3b.
  • FIG. 4 shows in a fundamental and schematic manner the control device 46 which ensures that the destruction process 32 is carried out in the collecting vehicle 10 or in the collecting container 12.
  • This control device 46 can, for example, also control the lifting and emptying device 22, the control device 46 can also take on further control functions.
  • the control device 46 is in connection with the destruction device 34, 36 in order to be able to send control signals to the destruction device 34, 36, for example.
  • These control signals are selected in such a way that the destruction device 34, 36 carries out the destruction of the data carriers 14 according to the desired destruction method 32. In particular, it emerges from these control signals whether destruction is carried out according to a first destruction process or according to a second destruction process.
  • the destruction device 34, 36 is controlled by these control signals in such a way that, for example, the addition of liquid 48 explained in relation to FIG. 2b takes place or does not occur. When adding the liquid 48, a higher security level is achieved than with The addition of the liquid 48 is omitted.
  • the control device 46 thus controls which destruction process is carried out by the destruction device 34, 36, and thus which security level is achieved when the selected destruction process is carried out.
  • the control device 46 is connected on the input side to different devices which, for example, record information relevant to the destruction process and pass it on to the control device 46.
  • a liquid 48 for example, it can be a flow meter 58 which, for example, supplies information to the control device 46 as to what amount of liquid 48 is added per unit of time.
  • the control device 46 can, for example, also be supplied with information from a weighing device 60 which, for example, records the amount of data carrier material that has been emptied from the individual container 14. This weighing device 60 can, for example, weigh the individual container 14 before emptying and after emptying and deduce the emptied amount from the difference.
  • the control device 46 can also be connected to further sensors 62 which, for example, detect the speed of a shredding device or the power consumption of a shredding device or which in some other way detect features or performance features of devices that are used for the destruction.
  • control device 46 can, however, also be connected to image-recording and / or video-recording devices 64.
  • image monitoring and / or video monitoring can be provided at several destruction-relevant locations, for example in the area of emptying the individual containers 14, for example in the area of shredding 36, 36a and / or for example also in the area of the collecting compartment 44.
  • the devices 58, 60, 62, 64 mentioned supply information to the control device 46, namely to the input 66 of the control device 46.
  • the control device 46 can, for example, control the destruction device 34, 36 on the basis of information received.
  • the control device 46 also has a wireless communication device 68 in order to wirelessly communicate with external communication devices 70, 71, 72, 74. These external communication devices 70, 71, 72, 74 should be those that are available at client A.
  • the communication device 68 can of course also communicate with other devices that are provided, for example, by the destruction service provider, for example with a central control device in which information relevant to the order and destruction is stored.
  • the communication device 68 also communicates with the electronic lock 17 of the individual containers 16, for example in order to read out information stored there, for example on the security level after which the individual container contents are to be destroyed.
  • control device 68 The possibility of communication between the control device 68 and external devices 70, 71, 72, 74 arranged at the client A enables the client A to intervene in a controlling manner. It is shown by way of example that, for example, the corresponding device at client A consists of a smartphone 70 and / or tablet 72 and / or notebook or PC 74 and / or a special remote control unit 71. Several of these devices could also be available to the client A in order to communicate with the control device 46 and thus with the collection vehicle 10.
  • control device 46 via the devices 70, 71, 72, 74 of the client A, for example on the security level according to which the destruction 32 of the collected data carriers 14 is to take place. It is also possible for an already started destruction process 32 to be aborted as soon as the client A sends a corresponding command to the control device 46 via the device 70, 71, 72, 74 available to him. It is also conceivable that the client A instructs the control device 46 via the devices 70, 71, 72, 74 available to him to change the security level according to which the destruction process 32 is carried out.
  • the wireless communication device 68 of the control device 46 also allows information to be transmitted to the devices 70, 71, 72, 74 present at the client A.
  • this can be a message that the destruction has been completed.
  • this can also be a customary destruction certificate, as is already customary in the prior art given to a client A to prove that the data carrier has been destroyed.
  • status messages are output to the devices 70, 71, 72, 74 at client A or recorded image and / or video material is transmitted so that client A can, for example, observe or monitor the destruction process 32. It is also conceivable that the execution of the destruction process 32 is only started when a positive confirmation from the client A is available.

Landscapes

  • Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Food Science & Technology (AREA)
  • Mechanical Engineering (AREA)
  • Refuse Collection And Transfer (AREA)
  • Refuse-Collection Vehicles (AREA)

Abstract

L'invention concerne un procédé de destruction à la demande et mobile de supports de données (14) dans des véhicules de collecte (10) à l'aide d'un système comprenant des récipients individuels (16) verrouillables pour le lancement et la réception de supports de données (14) avec un contenu confidentiel et d'un véhicule de collecte mobile (10) ayant des récipients de collecte (12) pour vider les récipients individuels (16) verrouillables dans les récipients de collecte (12). Les supports de données vidés (14) à partir des récipients individuels (16) sont détruits dans le récipient de collecte (12) selon un procédé de destruction (32). Ledit procédé de destruction (32) présente au moins une étape de broyage (36, 36a) et est exécuté selon une première séquence de traitement et commandé par un dispositif de commande (46). Dans ladite première séquence de traitement, une destruction des supports de données vidés (14) se produit en fonction d'un premier niveau de sécurité (P4), caractérisée en ce que la destruction (32) se produit selon une seconde séquence de traitement selon les besoins et commandée par le dispositif de commande (46). Dans ladite deuxième séquence de traitement, une destruction des supports de données vidés (14) se produit selon un deuxième niveau de sécurité (P7) qui est supérieur au premier niveau de sécurité.
EP20806984.9A 2019-11-22 2020-11-11 Procédé et système de destruction à la demande et mobile de supports de données dans des véhicules de collecte Pending EP4061549A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102019131615.4A DE102019131615B3 (de) 2019-11-22 2019-11-22 Verfahren und System zur bedarfsgerechten und mobilen Vernichtung von Datenträgern in Sammelfahrzeugen
PCT/EP2020/081750 WO2021099193A1 (fr) 2019-11-22 2020-11-11 Procédé et système de destruction à la demande et mobile de supports de données dans des véhicules de collecte

Publications (1)

Publication Number Publication Date
EP4061549A1 true EP4061549A1 (fr) 2022-09-28

Family

ID=73401512

Family Applications (1)

Application Number Title Priority Date Filing Date
EP20806984.9A Pending EP4061549A1 (fr) 2019-11-22 2020-11-11 Procédé et système de destruction à la demande et mobile de supports de données dans des véhicules de collecte

Country Status (3)

Country Link
EP (1) EP4061549A1 (fr)
DE (1) DE102019131615B3 (fr)
WO (1) WO2021099193A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102021120953B3 (de) 2021-08-11 2022-08-11 REISSWOLF Akten- und Datenvernichtung GmbH & Co. KG Verfahren und System zur bedarfsgerechten und mobilen Vernichtung von Datenträgern in Sammelfahrzeugen

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2214786B2 (de) 1972-03-25 1981-03-19 Eba-Maschinenfabrik Adolf Ehinger Kg, 7460 Balingen Verfahren und Einrichtung zum Vernichten von Akten
DE3025631C2 (de) 1980-07-07 1986-06-12 DATA - LÖSCH Gesellschaft für Sicherheitstechniken im Datenschutz mbH, 4405 Nottuln Verfahren zur zugriffgesicherten Zerkleinerung von zu schützendem Gut mittels einer Zerkleinerungsanlage
DE3714587A1 (de) 1987-05-01 1988-11-10 Poettinger Alois Landmasch Schneckenpresse sowie verfahren zur umformung von abfallpapier in handhabbare presslinge
FR2792918B1 (fr) 1999-04-30 2001-07-13 Alpha Distrib Procede de collecte et de destruction mobile de papier
US6491245B1 (en) 2000-04-05 2002-12-10 David E. Rajewski Mobile shredding system
DE20010412U1 (de) * 2000-06-15 2000-11-23 "Reisswolf" Akten- und Datenvernichtung GmbH & Co, 20537 Hamburg System aus verschließbaren Einzelbehältern und einem Sammelbehälter zum Entleeren solcher verschließbaren Einzelbehälter
DE10028803C2 (de) 2000-06-15 2003-07-10 Reisswolf Akten Und Datenverni System aus verschließbaren Einzelbehältern und einem Sammelbehälter zum Entleeren solcher verschließbaren Einzelbehälter
US20090065616A1 (en) * 2007-09-10 2009-03-12 Walsh Nicholas G Paper shredding truck
EP2613883A4 (fr) * 2011-01-14 2014-08-27 Shred Tech Corp Déchiquetage de matériau recyclable contenant des informations
WO2012138712A1 (fr) * 2011-04-04 2012-10-11 Numerex Corp. Caisson sécurisé de destruction de documents
US8882008B1 (en) * 2011-04-30 2014-11-11 Peter Viveen Dual shredding system for a mobile document shredding vehicle and method of use
JP2014018715A (ja) 2012-07-13 2014-02-03 Relief Niigata Co 車載書類処理システム
CH708421A8 (de) 2013-02-28 2015-05-15 Dissolvetech Ag Datenträgervernichtungsverfahren, Sammelfahrzeug und Verwendung einer Auflösevorrichtung.
DE202015009629U1 (de) 2014-11-07 2018-11-15 Akten-Ex Gmbh & Co. Kg Anlage zur Aktenvernichtung
NL2016354B1 (nl) 2016-03-02 2017-07-21 Van Schijndel Holding B V Inrichting alsmede systeem voor het verwerken van vertrouwelijk materiaal.

Also Published As

Publication number Publication date
DE102019131615B3 (de) 2020-12-31
WO2021099193A1 (fr) 2021-05-27

Similar Documents

Publication Publication Date Title
EP0373460B1 (fr) Méthode pour le dépôt des déchets
EP0769458B1 (fr) Procédé et dispositif de détermination des quantités des produits collectés, notamment d'ordures ménagères
DE4301066A1 (de) Verfahren und Vorrichtung zum Aufbereiten von Kunststoffabfall
DE102019131615B3 (de) Verfahren und System zur bedarfsgerechten und mobilen Vernichtung von Datenträgern in Sammelfahrzeugen
EP3102508B1 (fr) Procédé de destruction de supports de données et véhicule de collecte
DE102021120953B3 (de) Verfahren und System zur bedarfsgerechten und mobilen Vernichtung von Datenträgern in Sammelfahrzeugen
EP1476376B1 (fr) Collecte, transport et elimination securisee de documents et de supports de donnees
DE60024912T2 (de) Verfahren zum mobilen Sammlen und Zerkleinern von Papier
EP0788984A1 (fr) Procédé et dispositif pour contrÔler la quantité d'ordures délivrées à une installation de ramassage d'ordures
DE3025631A1 (de) Zugriff- und informationssicheres verfahren der bearbeitung von zu schuetzendem gut
DE202018101513U1 (de) Mobiler Presscontainer
DE10028803C2 (de) System aus verschließbaren Einzelbehältern und einem Sammelbehälter zum Entleeren solcher verschließbaren Einzelbehälter
DE29613111U1 (de) Einrichtung zur Erfassung von Sammelmengen, insbesondere von Abfall aus Haushalten
DE102010026737A1 (de) Vorrichtung zur Verdichtung von Abfällen
DE202009012086U1 (de) Vorrichtung zum Zerkleinern von Gegenständen
EA044299B1 (ru) Система и способ мобильного уничтожения носителей информации в собирающих транспортных средствах
DE10014024C2 (de) Müllanlieferungsanlage
DE10301921A1 (de) Vorrichtung und Verfahren zur Entsorgung von Abfallstoffen
DE102004053806A1 (de) Mobile Datenvernichtungsanlage
CH707651A1 (de) Datenträgervernichtungsverfahren, Sammelfahrzeug und Verwendung einer Auflösevorrichtung.
DE20010412U1 (de) System aus verschließbaren Einzelbehältern und einem Sammelbehälter zum Entleeren solcher verschließbaren Einzelbehälter
DE29619182U1 (de) Einhausung für Selbst-Lader-Müllgroßbehälter
EP3072674A1 (fr) Dispositif de compression de dechets, comprenant un boitier dote d'un recipient collecteur de dechets interchangeable
DE102015009476A1 (de) Vorrichtung zum Verdichten von Abfällen, bestehend aus einem Gehäuse mit auswechselbarem Abfallsammelbehälter
DE202012103853U1 (de) Datenträgersammelvorrichtung mit integriertem Datenträgervernichter

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20220622

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40073791

Country of ref document: HK

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230524

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

RIC1 Information provided on ipc code assigned before grant

Ipc: B09B 3/20 20220101ALI20231231BHEP

Ipc: B09B 5/00 20060101ALI20231231BHEP

Ipc: B30B 9/30 20060101ALI20231231BHEP

Ipc: B65F 1/10 20060101ALI20231231BHEP

Ipc: B65F 3/14 20060101ALI20231231BHEP

Ipc: B02C 18/00 20060101ALI20231231BHEP

Ipc: B02C 21/02 20060101ALI20231231BHEP

Ipc: B02C 23/20 20060101ALI20231231BHEP

Ipc: B65F 3/00 20060101ALI20231231BHEP

Ipc: B09B 3/00 20220101AFI20231231BHEP

17Q First examination report despatched

Effective date: 20240206