Information recording meduim destruction device management method

ABSTRACT

A destruction device management method is provided that is capable of minimizing a risk that an information recording medium supposed to be disposed of as waste is taken out and distributed to a secondhand market and a risk that information leaks from the information recording medium. 
     In the present invention, a server device records personal identification information, destruction device identification information, and location information, received from a mobile terminal, in an information recording means. As a result, the server device can centrally manage information such as where the destruction device was located, which destruction device was used, and who performed the destruction work. That is, when the destruction of information recording medium is performed using the destruction device, the record is always stored in the server device. Therefore, the risk of information recording medium being taken outside by a malicious employee or the like can be suppressed because the information recording medium cannot be taken outside (under the false pretense that it has been destructed) without actually operating the destruction device at all.

TECHNICAL FIELD

The present invention relates to a management method of a deviceconfigured to destruct an information recording medium (an electronicrecording medium such as a hard disk drive or a semiconductor memory)that has been handled as waste. The present invention also relates to anautomatic generation method of a destruction record (destruction proof)for proving a fact that an information recording medium has beendestructed.

BACKGROUND ART

Many kinds of confidential information such as personal information,trade secrets, and defense secrets are recorded in an informationrecording medium used by a company, an administrative agency, a localpublic organization, or the like (collectively referred to as “companyor the like” in this application). Therefore, in a case where a companyor the like disposes of an unnecessary information recording medium aswaste, it is required to physically destruct the information recordingmedium.

As a physical destruction method of the information recording medium,bending destruction, drilling destruction, magnetic erasure by a strongmagnetic field, and the like are adopted, and by physically destructingthe information recording medium in this way, data recorded in theinformation recording medium cannot be read or restored.

In view of the demand for the above-described destruction processing ofthe information recording medium, in recent years, the demand for adedicated destruction device configured to physically destruct theinformation recording medium has increased, and a large number of thedestruction devices have been delivered to companies that have requesteddestruction processing to external contractors in addition tocontractors that undertake disposal of the information recording medium.

A company or the like that has purchased the destruction device causesan employee belonging to the company to perform destruction work of anunnecessary information recording medium as a job.

In addition, a disposal contractor who has purchased the destructiondevice receives an order from a company or the like for destructionprocessing of the information recording medium, and causes an employeebelonging to the disposal contractor to perform the destructionprocessing.

However, even in a case where a company or the like destructs aninformation recording medium internally, or even in a case where thecompany or the like requests an external disposal contractor, there isactually a considerable risk that the information recording medium isnot destructed, but is taken out to the outside by an employee or thelike (regular employees, temporary employees, contract employees,part-time workers, or the like) lacking morals, and is transferred to asecondhand market. In addition, such an incident has actually occurred.

In addition, there is a possibility that a contractor that undertakesdestruction of the information recording medium entrusts actualdestruction work to an external subcontractor, and in this case, thereis a risk that the information recording medium is taken out withoutbeing actually destructed by the subcontractor or an employee thereofand transferred to a secondhand market.

In addition, there is a possibility that a contractor who has undertakenthe destruction of the information recording medium lends thedestruction device to another contractor and entrusts the actualdestruction work to the contractor that is a destination of lending.Even in this case, there is a risk that the information recording mediumis not actually destructed by the contractor that has received lendingor its employee and is leaked to the secondhand market.

Then, in a case where an information recording medium that is supposedto be disposed of as waste is distributed in a secondhand market, alarge amount of pieces of confidential information leaks to the outside,business reliability is impaired for a company or the like, and in somecases, a problem arises in that security in national defense isimpaired, and the company or the like is fatally damaged.

Therefore, it is required to keep a destruction record (destructionproof) with high probative force that can truly prove the fact that theinformation recording medium was destructed.

On the other hand, with an increase in demand for an informationrecording medium destruction device, it has been studied by theinventors of the present application that the destruction device is lentand charged according to the frequency of use or the like. However, itis difficult to individually and accurately grasp a frequency of use ofeach of a large number of destruction devices lent to variouscontractors and the like.

SUMMARY OF INVENTION Technical Problem

In view of the above-described problem, an object of the presentinvention is to provide a destruction device management method capableof suppressing at a maximum a risk that an information recording mediumto be disposed of as waste is taken out and distributed to a secondhandmarket and a risk that information leaks from the information recordingmedium. Another object of the present invention is to provide adestruction device management method for making it possible to easilyand accurately grasp the frequency of use of each of a large number ofinformation recording medium destruction devices. Another object of thepresent invention is to provide a method for automatically generating adestruction record (destruction proof) having a high probative forcethat can truly prove the fact that the information recording medium hasbeen destructed.

Solution to Problem

The foregoing object is achieved by a destruction device managementmethod including:

(a) a step of reading, by a mobile terminal, via its own camera means,destruction device identification information included in anidentification display of a destruction device before starting adestruction work using the destruction device;

(b) a step of acquiring, by the mobile terminal, via its own locationinformation acquisition means, location information on a currentlocation of the mobile terminal at the time of execution of the step(a);

(c) a step of transmitting, by the mobile terminal to a server device,

personal identification information for identifying a person who usesthe mobile terminal,

the destruction device identification information read in the step (a),and

the location information acquired in the step (b); and

(l) a step of recording, by the server device in an associated state

the personal identification information, the destruction deviceidentification information, and the location information

received from the mobile terminal

in an information recording means.

The destruction device management method may further include:

(h) a step of capturing, by the mobile terminal, by using a camerameans, an external appearance of an information recording medium aswaste after being destructed, and acquiring post-destruction image datain which the external appearance is captured; and

(i) a step of transmitting, by the mobile terminal, the post-destructionimage data acquired in the step (h) to the server device.

In this case, in the step (l),

the server device records in an associated state the personalidentification information, the destruction device identificationinformation, the location information, and the post-destruction imagedata received from the mobile terminal in the information recordingmeans.

Furthermore, the destruction device management method may furtherinclude:

(f) a step of capturing, by the mobile terminal by using the camerameans, an external appearance of an information recording medium aswaste before being destructed, and acquiring pre-destruction image datain which the external appearance is captured; and

(g) a step of transmitting, by the mobile terminal, the pre-destructionimage data acquired in the step (f) to the server device.

In this case, in the step (l),

the server device records in an associated state the personalidentification information, the destruction device identificationinformation, the location information, the pre-destruction image data,and the post-destruction image data received from the mobile terminal inthe information recording means.

In the destruction device management method, the information recordingmedium to be destructed has an identification display indicating mediumidentification information for identifying the information recordingmedium.

In this case, in the step (f), the pre-destruction image data acquiredby the mobile terminal by using the camera means includes anidentification display indicating the medium identification information.

In this case, in the step (h), the post-destruction image data acquiredby the mobile terminal by using the camera means includes anidentification display indicating the medium identification information.

Furthermore, in the destruction device management method,

in the step (l), the information to be recorded in an associated stateby the server device in the information recording means may furtherinclude information on a requester of destruction of the informationrecording medium.

Furthermore, the destruction device management method may furtherinclude:

(d) a step of reading, by the mobile terminal by using its own camerameans, a pre-work counter value that is a numerical value displayed on acounter of the destruction device, before starting a destruction workusing the destruction device; and

(e) a step of transmitting, by the mobile terminal, the pre-work countervalue read in the step (d) to the server device.

In this case, in the step (l),

the server device records in an associated state the personalidentification information, the destruction device identificationinformation, the location information, and the pre-work counter valuereceived from the mobile terminal in the information recording means.

Furthermore, the destruction device management method may furtherinclude:

(j) a step of reading, by the mobile terminal by using its own camerameans, a post-work counter information that is a numerical valuedisplayed on a counter of the destruction device, after completing adestruction work using the destruction device; and

(k) a step of transmitting, by the mobile terminal, the post-workcounter value read in the step (j) to the server device.

In this case, in the step (l),

the server device records in an associated state the personalidentification information, the destruction device identificationinformation, the location information, the pre-work counter value andpost-work counter value received from the mobile terminal in theinformation recording means.

Furthermore, the destruction device management method may furtherinclude:

a step of calculating, by the server device, the number of destructiontimes in the current destruction work based on the pre-work countervalue and the post-work counter value.

In this case, in the step (l),

the server device records in an associated state the personalidentification information, the destruction device identificationinformation, the location information, and the pre-work counter value,the post-work counter value, and the number of destruction times in thecurrent destruction work received from the mobile terminal in theinformation recording means.

In the destruction device management method, the server device mayobtain an increase amount of the counter value in the predeterminedperiod for each of the plurality of destruction devices based on thepre-work counter value and the post-work counter value.

In addition, the destruction device used in the destruction devicemanagement method includes, as means configured to physically destructthe information recording medium, for example,

a pressurization-type destruction means that applies pressure todestruct the information recording medium to be destructed, or

a magnetic type destruction means that applies magnetic force todestruct the information recording medium to be destructed.

The pressurization-type destruction means includes, for example,

a pressurizing unit including a plurality of hydraulic cylindersconfigured to apply pressure so as to destruct information recordingmedium to be destructed, and

a hydraulic pressure source configured to supply hydraulic oil to eachhydraulic cylinder of the pressurizing unit.

In addition, the above-described object is achieved by automaticallygenerating an information recording medium destruction record(destruction proof) on which any one or more of the following 1 to 6 isposted on the basis of information registered in an informationrecording medium of a server device.

1. Information regarding a requester of destruction of informationrecording medium (a name of company or organization, and the like)

2. Evidence images (images before and after destruction and the like) ofinformation recording medium to be destructed.

3. Identification information of information recording medium to bedestructed

4. Date and time when destruction of information recording medium wasperformed

5. Location where destruction of information recording medium wasperformed (address, latitude and longitude, map, and the like)

6. Information regarding a person in charge who performed destruction ofinformation recording medium (name, affiliation, and the like)

Advantageous Effects of Invention

In the present invention, the server device records in an associatedstate the personal identification information, the destruction deviceidentification information, and the location information received fromthe mobile terminal in the information recording means.

As a result, the server device can centrally manage information such aswhere the destruction device was located, which destruction device wasused, and who performed the destruction work. That is, when thedestruction of information recording medium is performed using thedestruction device, the record is always stored in the server device.

Therefore, the risk of information recording medium being taken outsideby a malicious employee or the like can be suppressed because theinformation recording medium cannot be taken outside (under the falsepretense that it has been destructed) without actually operating thedestruction device at all.

In addition, since such information as where the destruction device waslocated, which destruction device was used, and who performed thedestruction work can be retroactively confirmed at any time, it ispossible to contribute to improve credibility with respect todestruction processing of the information recording medium.

In addition, since the above-described information is transmitted to theserver device each time the destruction work using the destructiondevice is started, it is possible to grasp at least whether or not thedestruction device is used at a remote place. Therefore, when thedestruction device is lent, it is possible to charge for use of thedestruction device.

In addition, by grasping the location information of the destructiondevice, in a case where the destruction device is lent, it is possibleto prevent the destruction device from being subleased withoutpermission.

Furthermore, by recording the location information of the destructiondevice, in a case where the destruction processing of the destructiondevice is requested to an external contractor, it is possible to confirmwhether the destruction work is appropriately destructed by the requestdestination (without being left to another contractor). Therefore, in acase where the destruction of the information recording medium isrequested to an external contractor, a company or the like can obtain asense of security (that the destruction processing is appropriatelyperformed in the contractor).

In the present invention, the server device records, in an associatedstate, the personal identification information, the destruction deviceidentification information, the location information, thepre-destruction image data, and the post-destruction image data receivedfrom the mobile terminal in the information recording means.

The “pre-destruction image data” is visual evidence data indicating anexternal appearance of the information recording medium before thedestruction, and the “post-destruction image data” is visual evidencedata indicating that the information recording medium has beendestructed.

By keeping a record in the server device including such visual evidencedata (image data before and after destruction), it is possible toprevent a false report (a false report that the server device isdestructed when it is not actually destructed). Therefore, the risk ofinformation recording medium being taken outside by a malicious employeeor the like can be further suppressed. In addition, for a company or thelike that disposes of the information recording medium, it is possibleto obtain a sense of security by keeping visual evidence of destruction.

In addition, by keeping a record in the server device including suchvisual evidence data (image data before and after destruction), it ispossible to contribute to improvement of credibility of a disposalcontractor using the destruction device.

In the present invention, the information recording medium to bedestructed has an identification display indicating mediumidentification information for identifying the information recordingmedium. This identification display is configured by, for example, aseal such as a barcode or a serial number affixed by a manufacturer ofthe information recording medium, a seal such as a barcode or a serialnumber affixed by a user of the information recording medium (a personwho discards the information recording medium), and identificationinformation such as a number or a symbol handwritten by the user of theinformation recording medium with a magic pen or the like.

Therefore, the above-described visual data (image data before and afterdestruction) inevitably includes the above-described identificationdisplay.

As a result, the destruction process cannot be falsified, and thus therisk of information recording medium being taken outside by a maliciousemployee or the like can be further suppressed.

In addition, by including the identification display in the visual data(image data before and after destruction), it is possible toretroactively confirm the presence or absence of the destructionprocessing of the specific information recording medium.

In addition, for a company or the like that disposes of the informationrecording medium, it is possible to obtain a sense of security bykeeping visual evidence of destruction including individualidentification display.

In the present invention, the information recorded in the informationrecording means by the server device may include information on therequester of destruction. As a result, it is possible to search for andconfirm evidence of destruction or the like for each requester regardingthe information to be centrally managed by the server device.

According to the present invention, since the counter value of thedestruction device can be grasped at a remote place, when thedestruction device is lent, billing based on the counter value can beperformed similarly to a lease copier or the like.

In addition, in the server device, falsification of the counter valuecan be prevented by centrally managing the counter value of eachdestruction device.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a diagram illustrating an outline of a destruction devicemanagement method according to the present invention.

FIG. 2 is a diagram illustrating an outline of the destruction devicemanagement method according to the present invention.

FIG. 3 each is a front view and a side view illustrating an example ofthe destruction device used for implementing the management methodaccording to the present invention.

FIG. 4 each is a view illustrating an example of an internal structureof the destruction device.

FIG. 5 is a block diagram illustrating a functional configuration of aserver device used for implementing the management method according tothe present invention.

FIG. 6 is a diagram illustrating an example of information registered ina “user management file” of the server device.

FIG. 7 is a diagram illustrating an example of information registered ina “destruction device management file” of the server device.

FIG. 8 is a diagram illustrating an example of information registered inan “evidence management file” of the server device.

FIG. 9 is a view illustrating an example of a pre-destruction evidenceimage and a post-destruction evidence image captured in the destructiondevice management method.

FIG. 10 is a diagram illustrating an example of destruction proof(destruction record) proving the fact that the information recordingmedium is destructed.

FIG. 11 is a diagram illustrating another example of destruction proof(destruction record) proving the fact that the information recordingmedium has been destructed.

FIG. 12A is a flowchart illustrating a flow of processing in adestruction device management method.

FIG. 12B is a flowchart illustrating a flow of processing in thedestruction device management method.

DESCRIPTION OF EMBODIMENT

Hereinafter, a specific embodiment of an “information recording mediumdestruction device management method” according to the present inventionwill be described.

(Outline of Information Recording Medium Destruction Device ManagementMethod)

An outline of a destruction device management method is each illustratedin FIGS. 1 and 2 .

The management method according to the present embodiment is a methodfor managing a plurality of destruction devices 1 configured tophysically destruct an information recording medium as waste.Specifically, the method is a method in which a large number ofdestruction devices 1 used by companies, administrative organizations,various groups, and the like in the world are centrally managed using asystem (destruction device management system) including a mobileterminal 3 and a server device 5.

Specific examples of the information recording medium to be destructedby the destruction device 1 include a portable electronic recordingmedium (portable recording medium) including a hard disk drive, asemiconductor memory, and the like. The electronic recording mediumincludes a solid state drive in addition to a hard disk drive.

Note that, in the accompanying drawings, a hard disk drive (HDD) isillustrated as an example of an information recording medium to bedestructed.

The destruction device 1 is a device configured to physically destructan information recording medium treated as waste by a company or thelike. Specific examples of the physical destruction of the informationrecording medium include bending destruction, drilling destruction, andmagnetic erasure by a strong magnetic field. By physically destructingthe information recording medium in this manner, data recorded in theinformation recording medium cannot be read. Alternatively, data cannotbe restored.

In implementation of the management method according to the presentembodiment, as illustrated in FIG. 1 , a system including a plurality ofmobile terminals 3 and a server device 5 that receives informationtransmitted from the mobile terminals via the Internet is used. In themobile terminal 3, an application (management application) for managinga destruction device is installed. The management application isdedicated software used to implement the management method according tothe present embodiment. An implementation procedure of the managementmethod according to the present invention using this system isschematically shown in FIG. 2 .

(Destruction Device)

Next, a configuration of a destruction device used to implement themanagement method will be described with reference to FIGS. 3 and 4 .

It is assumed that the destruction device to be managed by themanagement method according to the present embodiment is provided tocompanies, administrative agencies, various groups, and the like allover the world.

As shown in FIG. 3 , each destruction device includes:

-   -   a medium destruction chamber 11 in which an information        recording medium to be destructed is set;    -   a counter 13 that displays the total number of destruction times        so far; and    -   an identification display 15 including destruction device        identification information that is unique information for        identifying a destruction device.

The medium destruction chamber 11 has a space in which an informationrecording medium to be destructed can be taken in and out.

In the counter 13, each time one information recording medium isdestructed using the destruction device, the counter value increases byone.

In the present embodiment, a seal on which a two-dimensional code isprinted is used as the identification display 15, but the identificationdisplay 15 is not limited thereto as long as it can be read using acamera, and for example, a seal on which a barcode is printed, a seal onwhich a serial number is printed, or the like can be used.

Furthermore, as illustrated in FIG. 4 , the destruction device includes

as a means configured to apply a destruction action to the informationrecording medium 7 set in the medium destruction chamber 11,

-   -   a pressurizing unit 31 including a biaxial hydraulic cylinder        21,    -   a hydraulic pressure source 33 that functions as a power source        of the pressurizing unit 31, and the like.

When the hydraulic oil is supplied from the hydraulic pressure source 33toward the pressurizing unit 31, a rod 23 of each hydraulic cylinderadvances toward the recess 35 formed in the destruction chamber 11.Then, the information recording medium set in the destruction chamber 11is sandwiched between the leading end of the rod 23 of the hydrauliccylinder and the recess 35, receives strong pressure from the leadingend of the rod 23 of the hydraulic cylinder in this state, and is bentin a substantially V shape (substantially dogleg shape) to be physicallydestructed.

The hydraulic cylinder included in the destruction device is not limitedto the biaxial hydraulic cylinder illustrated in FIG. 4 , and may be auniaxial hydraulic cylinder or a triaxial or tetra-axial or morehydraulic cylinder.

In addition, the method for physically destructing the informationrecording medium is not limited to the method for bending theinformation recording medium into a substantially V shape, and may be amethod for forming a large number of holes in the information recordingmedium by a triaxial or tetra-axial or more crushing section.

Furthermore, the method for physically destructing the informationrecording medium is not limited to the bending or drilling as describedabove, and for example, a method for applying a strong magnetic field tothe information recording medium and magnetically erasing theinformation recording medium can be adopted.

The counter 13 displays the number of times the pressurizing unit 31 hasbeen operated so far, that is, the total number of destruction times.Therefore, the number of destruction times of the information recordingmedium can be grasped by reading the counter value of the destructiondevice. In a case where the destruction device is lent for a fee, it ispossible to charge money on the basis of the counter value.

The two-dimensional code of the identification display 15 includesunique identification information (ID) for identifying the destructiondevice. Therefore, by reading the identification information included inthe identification display, it is possible to identify the solid of thedestruction device.

Note that, in the present embodiment, the destruction device includes,as means configured to physically destruct the information recordingmedium, a pressurization-type destruction means that applies pressure tothe information recording medium to destruct the information recordingmedium, but may include a magnetic destruction means configured to applymagnetic force to the information recording medium to destruct theinformation recording medium.

(Mobile Terminal)

Next, a configuration of a mobile terminal used to implement themanagement method will be described.

The mobile terminal is a portable information terminal having a wirelesscommunication function or a camera capable of accessing the Internet,and specific examples thereof include a smartphone, a tablet terminal,and a mobile phone. In the present embodiment, a smartphone is used as amobile terminal.

The mobile terminal mainly includes:

-   -   a wireless communication unit capable of accessing the Internet;    -   a location information reception section configured to acquire        location information from a GPS satellite or the like;    -   a camera used to read a two-dimensional code or a counter value        of a destruction device;    -   an internal storage for storing various types of information;    -   a display section (a display including a touch screen) for        displaying various types of information;    -   a processor for controlling each of the above sections and        executing steps to be described later, and the like.

The internal storage of the mobile terminal stores

-   -   personal identification information for identifying a person who        uses the mobile terminal, and    -   a software such as a management application.

Personal identification information for identifying a person who usesthe management application is registered in the management application.Specific examples of the personal identification information to beregistered in the management application include a name and an employeenumber of the person.

In addition, the management application is authorized to access each ofthe wireless communication unit, the camera, and the locationinformation receiving section. Therefore, it is possible to receivelocation information on the management application, to read necessaryinformation via the camera, and to transmit information to the serverdevice via the Internet.

(Server Device)

The server device 5 receives the information transmitted from the mobileterminal 1 via the Internet.

As illustrated in FIG. 5 , the server device 5 includes:

-   -   a communication unit 51 for accessing the Internet;    -   an information recording medium 53 that stores various types of        information received from the mobile terminal 1; and    -   a processor 55 for controlling each of the above sections.

As illustrated in FIG. 5 , in the information recording medium 53 of theserver device 5,

-   -   a user management file,    -   a destruction device management file, and    -   the evidence management file        are registered.

As illustrated in FIG. 6 , in the user management file of the serverdevice 5, a personal ID (for example, an employee number), a name,information regarding an affiliated company, and the like of a personwho uses the management application are registered in association witheach other on a per-individual basis.

Therefore, for example, when the personal ID or the user name is known,the associated company or the like associated with the personal ID orthe user name can be instantly retrieved from the user management file,and when the associated company or the like is known, one or a pluralityof personal IDs or user names associated with the associated company orthe like can be instantly retrieved from the user management file.

As illustrated in FIG. 7 , a use history of each destruction device isrecorded in the destruction device management file of the server device5. The use history here is information regarding when, by whom, whereinstalled, and which destruction device was used, and how many times thedestruction device was used.

Every time the destruction device is used together with the mobileterminal in which the management application is installed, the nextinformation is registered in the destruction device management file inassociation with (as one record) the information transmitted from themobile terminal, and the destruction device management file is updated.That is, every time the destruction device is used, history informationcorresponding to one record is added to the destruction devicemanagement file in the server device, and the destruction devicemanagement file is updated.

-   -   Identification information of the destruction device,    -   identification information of a person who has used the        destruction device (identification information of a person        registered in the management application),    -   location information of place where destruction device is        placed,    -   start date and time of destruction work (start date and time of        use of destruction device),    -   end date and time of destruction work (use end date and time of        destruction device),    -   counter value before start of destruction work (counter value at        start of use of destruction device),    -   counter value after completion of destruction work (counter        value when use of destruction device is finished), and    -   the number destructed by the current destruction work.

Each time one or a plurality of information recording media isdestructed using the destruction device, the information of one recordis added to the destruction device management file in an associatedstate.

Therefore, for example, when the identification information of thedestruction device is known, the use history associated with theidentification information (information such as who used the destructiondevice and when and where the destruction device was used) can beinstantly retrieved from the destruction device management file. Inaddition, for example, when the identification information of the useris known, the use history associated with the identification information(information such as where the person used which destruction device) canbe instantly retrieved from the destruction device management file.

As illustrated in FIG. 8 , information on evidence of destruction of theinformation recording medium is recorded in the evidence management fileof the server device 5. The information on evidence of destruction hereis information regarding when, by whom, and which destruction device wasused to destruct which medium in what kind of manner.

Every time the information recording medium is destructed using thedestruction device, the next information is registered in the evidencemanagement file in association with (as one record) the informationtransmitted from the mobile terminal, and the evidence management fileis updated. That is, every time the information recording medium isdestroyed, evidence information corresponding to one record is added tothe evidence management file in the server device, and the evidencemanagement file is updated.

-   -   Identification information of the destruction device,    -   identification information of a person who has used the        destruction device (identification information of a person        registered in the management application),    -   image data (pre-destruction image data) showing the external        appearance of the information recording medium before        destruction,    -   captured date and time of the pre-destruction image data,    -   image data (post-destruction image data) showing the external        appearance of the information recording medium after        destruction,    -   captured date and time of the post-destruction image data,    -   identification information of destructed information recording        medium, and    -   information regarding the requester of the destruction        processing of the information recording medium (for example, the        name or telephone number of a company or the like).

Each time the information recording medium is destructed using thedestruction device, the information of one record is added to theevidence management file in an associated state.

Therefore, for example, when the identification information of thedestruction device is known, the use history associated with theevidence of destruction (information such as who destructed which mediumby using this destruction device) can be instantly retrieved from thedestruction device management file. In addition, for example, when arequester of destruction (for example, a company name or the like) isknown, evidence of destruction (information such as who destructed theinformation recording medium requested to be destructed by the requesterusing which destruction device.) associated with the requester can beinstantly retrieved from the destruction device management file.

Then, by using various types of information included in theabove-described destruction device management file and evidencemanagement file, it is possible to automatically create a destructionrecord (destruction proof) of the information recording medium asillustrated in FIGS. 10 and 11 . This destruction record (destructionproof) plays a role of truly proving the fact that the informationrecording medium was destructed, and can be used as a report to adestruction requester (destruction report of the information recordingmedium).

Hereinafter, a destruction record (destruction proof) of the informationrecording medium will be described.

In the present invention, the destruction record (destruction proof) ofthe information recording medium as illustrated in FIGS. 10 and 11 isautomatically output using the destruction device management file andthe evidence management file registered in the information recordingmedium of the server device.

Specifically, a destruction record (destruction proof) is automaticallyoutput on the basis of information corresponding to one record of theevidence management file and information of the destruction devicemanagement file associated with the information. By automaticallyoutputting the destruction record (destruction proof) in this manner, itis possible to save time and effort to create a destruction report tothe destruction requester.

The destruction record of the information recording medium may begenerated in a browsable electronic file format such as PDF or HTML andstored in the server device. Alternatively, as illustrated in FIGS. 10and 11 , it may be printed (output as a paper medium) in a predeterminedlayout.

In the case of outputting in a browsable electronic file format such asPDF or HTML, the output electronic file of the destruction record(destruction proof) is registered in the destruction record file of theserver device to be browsed at any time. In addition, in a case wherethe data is output in a browsable data format such as PDF or HTML, thedata may be stored in a server device in a browsable state via theInternet, or may be automatically transmitted to a requesting company orthe like by e-mail or the like.

In the destruction record (destruction proof) automatically output bythe server device, for example, information as listed below is posted ina predetermined layout.

1. Information regarding a requester of destruction of informationrecording medium (a name of company or organization, and the like)

2. Evidence images (images before and after destruction and the like) ofinformation recording medium to be destructed.

3. Identification information of information recording medium to bedestructed

4. Date and time when destruction of information recording medium wasperformed

5. Location where destruction of information recording medium wasperformed (address, latitude and longitude, map, and the like)

6. Information regarding a person in charge who performed destruction ofinformation recording medium (name, affiliation, and the like)

As the information 1 to 6 described above posted in the destructionrecord (destruction proof), various types of information included in thedestruction device management file or the evidence management fileregistered in the server device can be used. This is specifically asfollows.

Since each record of the evidence management file includes informationregarding the requester (for example, the name of the requester) (seeFIG. 8 ), this can be used as “Information regarding a requester ofdestruction of information recording medium”. Note that the “Informationregarding a requester of destruction of information recording medium” tobe posted in the destruction record (destruction proof) is notnecessarily a name, and may be, for example, an identification code ofthe requester.

Since each record of the evidence management file includes externalappearance image data before and after destruction of the informationrecording medium (see FIG. 8 ), this can be used as “evidence images ofinformation recording medium to be destructed”. Note that, asillustrated in FIG. 10 , the “evidence images of information recordingmedium to be destructed” may be only the evidence images before andafter destruction. However, as illustrated in FIG. 11 , an evidenceimage in which a series of processes (each stage from reception ofrequest for destruction processing to completion of destruction) of“reception of destruction request→immediately beforedestruction→immediately after destruction→disposal processing” can bevisually recognized may be posted. By posting evidence images visuallyproving a series of processes in this manner, it is possible to enhancethe probative force of destruction records (destruction proofs).

Since each record of the evidence management file includes the ID of thedestructed information recording medium (see FIG. 8 ), this can be usedas “identification information of information recording medium to bedestructed”.

Since each record of the evidence management file includes theinformation regarding the photographing date and time of thepost-destruction image of the information recording medium (see FIG. 7), this can be used as the “date and time when the destruction of theinformation recording medium is performed”. In addition, since eachrecord of the destruction device management file includes informationregarding the work start date and time and the work end date and time,this can also be used as “location where destruction of informationrecording medium was performed”.

Since each record of the destruction device management file includes thelocation information (information related to the location of thedestruction device), this can be used as “location where destruction ofinformation recording medium was performed”. The “location wheredestruction of information recording medium was performed” posted in thedestruction record (destruction proof) may be any of an addressindicating a location of the destruction device, latitude and longitude,and a map.

Note that, since each record of the evidence management file and eachrecord of the destruction device management file are in an associationwith each other by the device ID and the identification information ofthe user, a specific record of the destruction device management filecan be accessed from a specific record of the evidence management file.

Since each record of the evidence management file includes information(Name, ID) regarding the user of the destruction device (see FIG. 8 ),this can be used as “information regarding a person in charge whoperformed destruction of information recording medium”. Note that the“information regarding a person in charge who performed destruction ofthe information recording medium” described in the destruction recordmay include a face photograph of the person, a name of an organizationto which the person belongs, and the like.

Note that the above described pieces of information 1 to 6 are notnecessarily all posted on the destruction record (destruction proof),and one or two or more pieces of information arbitrarily selected fromthese pieces of information may be posted on the destruction record(destruction proof) as necessary.

(Information Recording Medium Destruction Device Management Method)

Next, a destruction device management method using a mobile terminal anda server device will be mainly described with reference to eachflowchart of FIG. 12 .

In implementing the management method of the present embodiment, first,a worker (a person in charge of the destruction processing) who performsthe destruction processing of the information recording medium moves,with a mobile terminal, to a work site where the destruction device isplaced.

Next, when the worker arrives at the site where the destruction deviceis placed, the worker performs an operation of starting the managementapplication installed in the mobile terminal. In response to thisoperation, the mobile terminal starts activation of the managementapplication <step S101 in FIG. 12 >.

Next, when the management application is activated, the mobile terminalretrieves personal identification information registered in themanagement application in advance <S103>. The personal identificationinformation mentioned herein is information for identifying a person whouses the management application. Specific examples of the personalidentification information to be registered in the managementapplication include a name and an employee number of the person who usesthe management application. In addition, the personal identificationinformation may include image data of a face photograph of a person whouses the management application.

Next, the worker inputs requester information to the mobile terminal.The requester information is a name, a telephone number, an e-mailaddress, or the like of a company or the like that has requesteddestruction of the information recording medium (information recordingmedium to be destructed). The requester information input operation maybe input using a software keyboard of a mobile terminal or may beselected from a drop-down list. By this input operation, the mobileterminal receives the input of the requester information <S105>.

Next, the worker activates the camera of the mobile terminal beingbrought with the worker, and orients the camera lens of the mobileterminal to face the two-dimensional code of the destruction device andthe counter (see FIG. 3(a)) to capture these images <S107>.

Then, the mobile terminal reads the destruction device identificationinformation from the image portion of the two-dimensional code capturedby the camera <S109>. At the same time, the mobile terminal reads thepre-work counter value (the counter value before starting thedestruction work) from the image portion of the counter captured by thecamera <S111>.

Furthermore, at the time of reading the destruction deviceidentification information, the mobile terminal acquires locationinformation (information on the current location of the mobile terminal)from a GPS satellite or the like via its own location informationacquisition means <S113>. The location information acquired through themobile terminal is treated as information on the current location of thedestruction device.

Then, the mobile terminal transmits

-   -   the personal identification information retrieved in step S103;    -   the requester information whose input has been accepted in step        S105;    -   the destruction device identification information read in step        S109;    -   the pre-work counter value read in step S111; and    -   the location information acquired in step S113

to the server device together with time information at the time oftransmission <S115>.

Next, before destructing the information recording medium to bedestructed, the worker orients the camera of the mobile terminal to facethe information recording medium to capture the external appearancethereof. As a result, the mobile terminal acquires the pre-destructionimage data in which the external appearance of the information recordingmedium before the destruction is captured <S121>.

As the pre-destruction image data, image data in which an informationrecording medium to be destructed is captured alone can be used.Alternatively, in a case where destruction of a plurality of informationrecording media is requested from a company or the like, as illustratedon the left side of FIG. 9 , image data captured in a state where theplurality of information recording media are collected can be used asthe pre-destruction image data.

The information recording medium to be destructed has an identificationdisplay including medium identification information for identifying theinformation recording medium. Therefore, the pre-destruction image dataacquired by the mobile terminal via the camera includes theidentification display indicating the medium identification information.

The medium identification information mentioned herein is uniqueinformation for identifying the information recording medium. Theidentification display including the medium identification informationmay be provided by a manufacturer of the information recording medium,or may be provided by a company or the like that discards theinformation recording medium. Specific examples of the identificationdisplay include a serial number, a barcode, a two-dimensional code, ahandwritten numeral or character, and a handwritten sign.

Next, the worker loads the information recording medium into the mediumdestruction chamber of the destruction device, and subsequently operatesa pressurizing unit including a biaxial hydraulic cylinder or the liketo physically destruct the information recording medium. Meanwhile, themobile terminal stands by with the management application beingactivated <S123>.

Next, the worker takes out the destructed information recording mediumfrom the destruction device, again orients the camera of the mobileterminal to face the information recording medium to capture theexternal appearance thereof. As a result, the mobile terminal acquiresthe post-destruction image data in which the external appearance of theinformation recording medium after the destruction is captured <S125>.The post-destruction image data acquired by the mobile terminal by usingthe camera means includes an identification display including the mediumidentification information.

As the post-destruction image data, image data in which an informationrecording medium to be destructed is captured alone can be used.Alternatively, in a case where destruction of a plurality of informationrecording media is requested from a company or the like, as illustratedon the right side of FIG. 9 , image data captured in a state where theplurality of information recording media are collected can be used asthe post-destruction image data.

Then, the mobile terminal transmits

-   -   the pre-destruction image data acquired in step S121; and    -   the post-destruction image data acquired in step S125 to the        server device <S127>.

The server device adds information corresponding to one record to theevidence management file on the basis of the information received fromthe mobile terminal through steps S203 and S205, and updates theevidence management file <S207>. See FIG. 8 for the evidence managementfile.

The information for one record added to the evidence management file bythe server device includes the following information as illustrated inFIG. 8 .

-   -   Identification information of the destruction device    -   Identification information of a person who has used the        destruction device (identification information of a person        registered in the management application)    -   Image data (pre-destruction image data) showing external        appearance of information recording medium before destruction    -   Captured date and time of pre-destruction image data    -   Image data (post-destruction image data) showing external        appearance of information recording medium after destruction    -   Captured date and time of post-destruction image data    -   Identification information of destructed information recording        medium    -   Information regarding a requester of destruction processing of        information recording medium (for example, the name or telephone        number of a company or the like)

Note that the information for one record added to the evidencemanagement file may include, in addition to the image data before andafter destruction of the information recording medium, image data thatshows a state when the information recording medium is received, imagedata that shows a state of being loaded into the destruction device, andthe like.

Next, the worker activates the camera of the mobile terminal broughtwith the worker (similarly to step S107), and orients the camera lens ofthe mobile terminal to face the two-dimensional code of the destructiondevice and the counter (see FIG. 3(a)) to capture these images <S133>.

Then, the mobile terminal reads the destruction device identificationinformation from the image portion of the two-dimensional code capturedby the camera <S135>. At the same time, the mobile terminal reads thepost-work counter value (the counter value after completion of thedestruction work) from the image portion of the counter captured by thecamera <S137>.

Then, the mobile terminal transmits

-   -   the personal identification information retrieved in step S103,    -   the destruction device identification information read in step        S135, and    -   the post-work counter value read in step S137,

to the server device together with time information at the time oftransmission <S139>.

On the other hand, the server device adds information corresponding toone record to the destruction device management file on the basis of theinformation received from the mobile terminal through steps S203 andS209, and updates the destruction device management file <S211>. SeeFIG. 7 for the destruction device management file.

The information for one record added to the destruction devicemanagement file by the server device includes the following informationas illustrated in FIG. 7 .

-   -   Identification information of the destruction device    -   Identification information of a person who has used the        destruction device (identification information of a person        registered in the management application)    -   Location information of place where destruction device is placed    -   Start date and time of destruction work (start date and time of        use of destruction device)    -   End date and time of destruction work (use end date and time of        destruction device)    -   Pre-work counter value (counter value at start of use of        destruction device)    -   Post-work counter value (counter value when use of destruction        device is finished)    -   The number destructed by the current destruction work

Note that “the number destructed by the current destruction work” is avalue calculated by the server device on the basis of the pre-workcounter value and the post-work counter value.

Based on the pre-work counter value and the post-work counter valuerecorded in the destruction device management file, the increase amountof the counter value in the predetermined period can be obtained foreach of the plurality of destruction devices.

In a case where the destruction device is lent for a fee, an invoice maybe automatically created on the basis of the “increase amount of thecounter value in the predetermined period” calculated by the serverdevice, and the invoice may be transmitted to the contractor to whichthe destruction device is lent by e-mail or the like.

REFERENCE SIGNS LIST

-   1 destruction device-   3 mobile terminal-   5 server device-   7 Information recording medium-   11 medium destruction chamber-   13 counter-   15 identification display-   21 hydraulic cylinder-   23 rod-   31 pressurizing unit-   33 hydraulic pressure source-   35 recess-   51 communication unit-   53 Information recording medium-   55 processor

1. A destruction device management method for managing a plurality ofdestruction devices configured to physically destruct an informationrecording medium as waste using a system including a mobile terminal anda server device, the destruction device management method being aninformation recording medium destruction device management method,wherein the plurality of the destruction devices each include: adestruction means configured to apply a destruction action to physicallydestruct an information recording medium; a counter for displaying thetotal number of destruction times so far; and an identification displayincluding destruction device identification information that is uniqueinformation for identifying each destruction device, the mobile terminalincludes: an information recording means configured to store personalidentification information for identifying a person who uses the mobileterminal; a location information acquisition means configured to acquirelocation information of the mobile terminal; and a camera meansconfigured to capture an external appearance of an information recordingmedium to be destructed, the server device includes: an informationrecording means configured to store information received from the mobileterminal, the information recording medium destruction device managementmethod further comprising: (a) a step of reading, by the mobileterminal, via its own camera means, the destruction deviceidentification information included in the identification display of thedestruction device before starting a destruction work using thedestruction device; (b) a step of acquiring, by the mobile terminal, viaits own location information acquisition means, location information ona current location of the mobile terminal at the time of execution ofthe step (a); (c) a step of transmitting, by the mobile terminal, to theserver device, personal identification information for identifying aperson who uses the mobile terminal, the destruction deviceidentification information read in the step (a), and the locationinformation acquired in the step (b); and (l) a step of recording, bythe server device, in an information recording means, the personalidentification information, the destruction device identificationinformation, and the location information received from the mobileterminal.
 2. The information recording medium destruction devicemanagement method according to claim 1, further comprising: (h) a stepof capturing, by the mobile terminal by using the camera means, anexternal appearance of an information recording medium as waste afterthe information recording medium has been destructed, and acquiringpost-destruction image data in which the external appearance has beencaptured; and (i) a step of transmitting, by the mobile terminal, thepost-destruction image data acquired in the step (h) to the serverdevice, wherein in the step (l) the server device records, in theinformation recording means, the personal identification information,the destruction device identification information, the locationinformation, and the post-destruction image data received from themobile terminal.
 3. The information recording medium destruction devicemanagement method according to claim 2, further comprising: (f) a stepof capturing, by the mobile terminal by using the camera means, anexternal appearance of an information recording medium as waste beforebeing destructed and acquiring pre-destruction image data in which theexternal appearance has been captured; and (g) a step of transmitting,by the mobile terminal, the pre-destruction image data acquired in thestep (f) to the server device, wherein in the step (l) the server devicerecords, in the information recording means, the personal identificationinformation, the destruction device identification information, thelocation information, the pre-destruction image data, and thepost-destruction image data received from the mobile terminal.
 4. Theinformation recording medium destruction device management methodaccording to claim 3, wherein an information recording medium to bedestructed has an identification display indicating mediumidentification information for identifying the information recordingmedium, and in the step (f), the pre-destruction image data acquired bythe mobile terminal by using the camera means includes an identificationdisplay indicating the medium identification information, and in thestep (h), the post-destruction image data acquired by the mobileterminal by using the camera means includes an identification displayindicating the medium identification information.
 5. The informationrecording medium destruction device management method according to claim1, wherein in the step (l), the information to be recorded in theinformation recording means by the server device further includesinformation on a requester of destruction of the information recordingmedium.
 6. The information recording medium destruction devicemanagement method according to claim 1, further comprising: (d) a stepof reading, by the mobile terminal by using its own camera means, apre-work counter value that is a numerical value displayed on a counterof the destruction device, before starting a destruction work using thedestruction device; and (e) a step of transmitting, by the mobileterminal, the pre-work counter value read in the step (d) to the serverdevice, wherein in the step (l), the server device records, in theinformation recording means, the personal identification information,the destruction device identification information, the locationinformation, and the pre-work counter value received from the mobileterminal.
 7. The information recording medium destruction devicemanagement method according to claim 6, further comprising: (j) a stepof reading, by the mobile terminal, by using its own camera means, apost-work counter information that is a numerical value displayed on acounter of the destruction device, after completing a destruction workusing the destruction device; (k) a step of transmitting, by the mobileterminal, the post-work counter value read in the step (j) to the serverdevice, wherein in the step (l), the server device records, in theinformation recording means, the personal identification information,the destruction device identification information, the locationinformation, the pre-work counter value, and the post-work counter valuereceived from the mobile terminal.
 8. The information recording mediumdestruction device management method according to claim 7, furthercomprising a step of calculating, by the server device, the number ofdestruction times in the current destruction work based on the pre-workcounter value and the post-work counter value, wherein in the step (l),the server device records, in the information recording means, thepersonal identification information, the destruction deviceidentification information, the location information, the pre-workcounter value, the post-work counter value, and the number ofdestruction times in the current destruction work received from themobile terminal.
 9. The information recording medium destruction devicemanagement method according to claim 7, wherein an increase amount ofthe counter value in a predetermined period is obtained for each of theplurality of destruction devices based on the pre-work counter value andthe post-work counter value recorded in the information recording meansof the server device.