Self-destructive documents for information security and privacy protection

A file and filament technology, applied in the field of self-destructing files for information security and privacy protection, can solve the problems of lack of practical application, solutions that cannot meet urgent needs, and incomplete erasure of information, etc., and achieve small increments cost effect

Active Publication Date: 2019-03-01
INVALUABLE INVENTIONS
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] While many solutions exist for protecting this private information, these usually require external devices (such as shredding paper), or may result in incomplete erasure of information, as this is usually done by simple tearing of paper, use of hidden stamps and mark etc.
Due to lack of practical applications, currently available solutions cannot meet the urgent need

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-destructive documents for information security and privacy protection
  • Self-destructive documents for information security and privacy protection
  • Self-destructive documents for information security and privacy protection

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0038] Example 1: This example provides a solution to the theft of corporate information such as communications generated in a controlled work environment. Such as Figure 1A As shown in , the present invention includes a cover sheet, a filament, and a release device, and may further include optional tabs. In this embodiment, the cover sheet is perforated so that the cutouts can be easily detached by pulling on the filament, but the pages retain their integrity and usability until detached. To destroy, the document is placed on a flat surface, text down, filament side up, anchored at the corners or as desired (e.g. by hand), and the filament is pulled to disengage the cutout. By removing the cutouts and the information printed thereon, the prints remaining on the residual document frame become incomprehensible when the prints are distributed over the entire surface of the document. Next, the stripper is pulled along the length of the hollow with the filament, sometimes with a...

example 2

[0039] Example 2: This example provides another solution to corporate information theft such as communications generated in a controlled work environment. As previously stated, the present invention includes a cover sheet, a filament with optional tabs, and a release device, and further includes a backing sheet. In this embodiment, the backing sheet has no adhesive covering the lower surface, and the optional release liner is omitted. The addition of the backboard supports and strengthens the covering sheet laid over it and provides a stronger file when the environment demands it. In this embodiment, the cover sheet can be perforated more heavily because the cutouts are supported by and adhered to the underlying non-perforated backing sheet. In this embodiment, the filaments are laid over the cover sheet and comprise a writable surface. In another embodiment, the cutouts can be completely severed from the cover sheet but held in place by an optional transparent top paper tem...

example 3

[0040] Example 3: This example provides a solution to the theft of personal information from discarded mail and containers. Such as Figure 2AAs shown in , the present invention provides a mailing label comprising a cover sheet, a filament, a release device and a backing sheet as described above, but in this embodiment, the lower surface of the backing sheet is coated with an adhesive compound, with an optional release liner that can be adhered to packaging, containers or mail. The addition of a backing sheet allows the invention to be attached to an article at will. In this embodiment, the cover sheet can be perforated more heavily because the cutouts are supported by and adhered to the underlying non-perforated backing sheet. By pulling the filaments and peeling away from the backing paper, the cutouts can be removed from the cover sheet, separating at the perforations while leaving the residual frame attached to the backing sheet. When the print is distributed over the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The inventor here discloses destructive (self-destructing) documents useful for the protection of confidential information. The invention comprises a document which can be easily and instantly brokendown into dozens of individual components, hence obliterating any information contained thereon. As the self-destruction of the document requires no extraneous equipment for destruction and guaranteeselimination of readable data, the invention represents a vast improvement over the state of the art. Numerous embodiments of the document of the invention specialized for different applications are illustrated and described.

Description

Background technique [0001] Threats to data privacy and identity theft are increasingly pervasive, causing untold suffering and hundreds of millions in loss every year for those whose personal or corporate information is stolen and misused. But while online hacking, phishing, and other computer-assisted theft of personal information grab headlines, much of this information is still obtained by extracting information from printed personal correspondence that ends up in the trash (often referred to as trash hunting). ) to steal the old fashioned way. [0002] The myriad items passing through the typical letterbox (some solicited, others not under the individual's control) contain a wealth of information in the public eye, from names and addresses to more that were not designed for public exposure private information. Currently, there is no quick and easy way for these items to ensure that this information is destroyed, and using information stolen from discarded mail etc. rema...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): B42D25/355D21H15/06D21H21/40D21H21/42D21H27/00
CPCB42D15/0073B42D25/346B42D25/20D21H27/00B42D25/355D21H5/00D21H21/40
Inventor 科迈尔·伊斯梅尔
Owner INVALUABLE INVENTIONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products