IT201800021445A1 - Blockchain-based system for certified destruction of documents - Google Patents
Blockchain-based system for certified destruction of documents Download PDFInfo
- Publication number
- IT201800021445A1 IT201800021445A1 IT102018000021445A IT201800021445A IT201800021445A1 IT 201800021445 A1 IT201800021445 A1 IT 201800021445A1 IT 102018000021445 A IT102018000021445 A IT 102018000021445A IT 201800021445 A IT201800021445 A IT 201800021445A IT 201800021445 A1 IT201800021445 A1 IT 201800021445A1
- Authority
- IT
- Italy
- Prior art keywords
- ledger
- blockchain
- destruction
- certified
- miner
- Prior art date
Links
- 230000006378 damage Effects 0.000 title claims description 11
- 238000000034 method Methods 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B02—CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
- B02C—CRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
- B02C18/00—Disintegrating by knives or other cutting or tearing members which chop material into fragments
- B02C18/0007—Disintegrating by knives or other cutting or tearing members which chop material into fragments specially adapted for disintegrating documents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Food Science & Technology (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Prostheses (AREA)
Description
DESCRIZIONE DESCRIPTION
La presente invenzione ha per oggetto un sistema basato su blockchain per la distruzione certificata dei documenti. The present invention relates to a blockchain-based system for the certified destruction of documents.
Con l’introduzione del nuovo regolamento sulla protezione dei dati personali (GDPR) risulta di notevole importanza il tema della distruzione dei documenti cartacei. With the introduction of the new regulation on the protection of personal data (GDPR), the issue of the destruction of paper documents is of considerable importance.
La blockchain rappresenta un utile strumento tecnologico per perseguire la certificazione delle fasi di un processo grazie all’utilizzo di un ledger distribuito contenente singoli blocchi fra loro correlati mediante hash. The blockchain represents a useful technological tool for pursuing the certification of the phases of a process thanks to the use of a distributed ledger containing individual blocks related to each other by hash.
Nel suddetto contesto, oggetto della nostra invenzione è essenzialmente quello di effettuare un sistema basato su blockchain per la distruzione certificata dei documenti grazie all’utilizzo di una interfaccia di connettività ad Internet (1) caratterizzata da RETE WIFI o Internet Gateway; cassonetto raccoglitore (2) dotato di scheda embedded con sensori magnetici e ad ultrasuoni (3) in grado di generare rispettivamente alert relativi alle aperture dello stesso o di rilevare il livello di portata raggiunto; modulo per la certificazione mediante registrazione su ledger (4) in blockchain degli alert provenienti in broadcast dal cassonetto raccoglitore e delle fasi effettuate dall’operatore relativamente al processo di distruzione mediante interfaccia HMI (5); modulo (6) “miner” presente per ciascun nodo ledger per il controllo certificato del processo di distruzione e per analisi di trend e report. In the above context, the object of our invention is essentially to carry out a blockchain-based system for the certified destruction of documents thanks to the use of an Internet connectivity interface (1) characterized by a WIFI NETWORK or Internet Gateway; collector box (2) equipped with an embedded board with magnetic and ultrasonic sensors (3) capable of generating alerts relating to the openings of the same or detecting the level of flow reached; module for certification by registration on ledger (4) in blockchain of alerts coming in broadcast from the bin and of the phases carried out by the operator in relation to the destruction process via HMI interface (5); module (6) "miner" present for each ledger node for certified control of the destruction process and for trend and report analysis.
A titolo di esempio si riporta una descrizione del funzionamento del sistema. Il singolo cassonetto viene riempito dagli utenti con documenti cartacei da distruggere in modo certificato. L’accesso al cassonetto avviene mediante guida e il monitoraggio delle aperture dello stesso avviene mediante utilizzo di uno o più sensori collegati al dispositivo embedded che monitora il cassonetto. I sensori magnetici posti all’apertura del cassonetto consentono il monitoraggio delle aperture ed eventuali manomissioni. Il livello di occupazione del cassonetto è invece garantito dall’utilizzo di sensore ad ultrasuoni che è tarato sul livello massimo di portata del cassonetto. Tutti gli eventi (alert) generati dal dispositivo embedded presente nel cassonetto vengono registrati su ledger. Sul ledger vengono anche registrati tutti gli eventi generati da interfaccia HMI dell’operatore autorizzato, che ne effettua manutenzione o il prelievo del cassonetto. Tutte le fasi di transito del cassonetto fino alla destinazione di distruzione vengono gestite mediante dispositivo HMI e si provvede per ogni fase ad effettuare la registrazione in blockchain. La registrazione in blockchain riguarda anche la fase di distruzione all’interno del macchinario, che può prevedere il collegamento diretto del macchinario alla blockchain (scrittura del ledger) per la registrazione degli eventi o la registrazione mediante interfaccia HMI effettuata da utente autorizzato. Su ciascun nodo della blockchain è presente un componente “miner” che è utilizzato per effettuare costantemente il controllo di coerenza del ledger, registrando anomalie riscontrate e ripristinando la coerenza del ledger mediante confronto con altri nodi. Il singolo ledger è caratterizzato dalla seguente tupla: By way of example, a description of the operation of the system is provided. The single bin is filled by users with paper documents to be destroyed in a certified way. Access to the box takes place by means of a guide and the monitoring of the openings of the same takes place through the use of one or more sensors connected to the embedded device that monitors the box. The magnetic sensors placed at the opening of the box allow the monitoring of the openings and any tampering. The level of occupation of the bin is instead guaranteed by the use of an ultrasonic sensor which is calibrated on the maximum flow rate of the bin. All events (alerts) generated by the embedded device in the box are recorded on the ledger. The ledger also records all the events generated by the HMI interface of the authorized operator, who carries out maintenance or removal of the bin. All the transit phases of the bin up to the destination of destruction are managed by an HMI device and registration in the blockchain is carried out for each phase. The blockchain registration also concerns the phase of destruction inside the machinery, which can provide for the direct connection of the machinery to the blockchain (writing the ledger) for the recording of events or the recording through the HMI interface carried out by an authorized user. On each node of the blockchain there is a "miner" component which is used to constantly check the coherence of the ledger, recording anomalies found and restoring the coherence of the ledger by comparing it with other nodes. The single ledger is characterized by the following tuple:
T_L = ( Alert, Timestamp, Hash_prev_T_L) T_L = (Alert, Timestamp, Hash_prev_T_L)
dove viene registrato il singolo alert con relativo riferimento temporale e l’hash relativo alla tupla precedente. where the single alert is recorded with its time reference and the hash relating to the previous tuple.
Eventuali anomalie sul calcolo degli hash riscontrati dal “miner” determinano la richiesta di ripristino del singolo ledger gestito. Any anomalies in the calculation of the hashes found by the "miner" determine the request to restore the single managed ledger.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IT102018000021445A IT201800021445A1 (en) | 2018-12-31 | 2018-12-31 | Blockchain-based system for certified destruction of documents |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IT102018000021445A IT201800021445A1 (en) | 2018-12-31 | 2018-12-31 | Blockchain-based system for certified destruction of documents |
Publications (1)
Publication Number | Publication Date |
---|---|
IT201800021445A1 true IT201800021445A1 (en) | 2020-07-01 |
Family
ID=66476701
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IT102018000021445A IT201800021445A1 (en) | 2018-12-31 | 2018-12-31 | Blockchain-based system for certified destruction of documents |
Country Status (1)
Country | Link |
---|---|
IT (1) | IT201800021445A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080088873A1 (en) * | 2006-10-13 | 2008-04-17 | Fuji Xerox Co., Ltd. | Document administration system and document destruction apparatus |
US20100243774A1 (en) * | 2009-03-24 | 2010-09-30 | Fellowers, Inc. | Shredder with jam proof system |
US20120247984A1 (en) * | 2011-04-04 | 2012-10-04 | Edward Jansson | Secure Document Destruction Bin |
US20170178125A1 (en) * | 2015-12-18 | 2017-06-22 | Telefonaktiebolaget L M Ericsson (Publ) | Trash collection systems and methods |
WO2018224724A1 (en) * | 2017-06-09 | 2018-12-13 | Nokia Technologies Oy | Electronic documents certification |
-
2018
- 2018-12-31 IT IT102018000021445A patent/IT201800021445A1/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080088873A1 (en) * | 2006-10-13 | 2008-04-17 | Fuji Xerox Co., Ltd. | Document administration system and document destruction apparatus |
US20100243774A1 (en) * | 2009-03-24 | 2010-09-30 | Fellowers, Inc. | Shredder with jam proof system |
US20120247984A1 (en) * | 2011-04-04 | 2012-10-04 | Edward Jansson | Secure Document Destruction Bin |
US20170178125A1 (en) * | 2015-12-18 | 2017-06-22 | Telefonaktiebolaget L M Ericsson (Publ) | Trash collection systems and methods |
WO2018224724A1 (en) * | 2017-06-09 | 2018-12-13 | Nokia Technologies Oy | Electronic documents certification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2883948T3 (en) | SCADA intrusion detection systems | |
Scott-Hayward et al. | Operationcheckpoint: Sdn application control | |
Zhou et al. | Secure network provenance | |
CN104021195B (en) | Warning association analysis method based on knowledge base | |
BR112016014887B1 (en) | SYSTEM TO DETECT OPERATIONAL ANOMALIES IN A RAILWAY WAGON, AND, SYSTEM TO DETECT OPERATIONAL ANOMALIES IN A TRAIN COMPOSITION | |
CN105672100B (en) | To vibrate the system that the operation of emitter, especially building machinery provides the information for representing vibrational state | |
CN108833522A (en) | A kind of believable system and method for determining node | |
IT201600109368A1 (en) | "Device for protection against cyber attacks on the vehicle via diagnostic connector and corresponding procedure" | |
IT201800021445A1 (en) | Blockchain-based system for certified destruction of documents | |
CN109948357A (en) | A kind of system connecting medical block chain and Internet of Things | |
DE102020215586A1 (en) | A SYSTEM AND PROCEDURE FOR NETWORK INTRUSION DETECTION BASED ON PHYSICAL MEASUREMENTS | |
CN103902917B (en) | Full-view monitoring method for access range and motion trails of cross-domain files | |
CN104504246B (en) | Reliability rapid evaluation algorithm based on the decoupling of ring spoke net | |
RU2007140924A (en) | REGIONAL SAFETY | |
WO2019076032A1 (en) | Method and system for classified storage of keys | |
CN107068020A (en) | The mark equipment in transmission line of electricity path | |
Rouf et al. | A hierarchical architecture for distributed security control of large scale systems | |
US20220179998A1 (en) | Apparatus and method for checking the integrity of sensor-data streams | |
CN205405621U (en) | Management entrance guard of tourist enterprise attendance machine | |
KR101580543B1 (en) | Network system for improving upstream traffic in wind power farm | |
CN109190983A (en) | Work tool management method, device and server | |
CN109462617A (en) | Device talk behavioral value method and device in a kind of local area network | |
Wan et al. | Fault detection for a class of discrete‐time nonlinear systems subject to network‐induced uncertainties | |
You et al. | Fast configuration change impact analysis for network overlay data center networks | |
Beckett et al. | Putting network verification to good use |