AU2012101113A4 - Wireless blasting module - Google Patents

Wireless blasting module Download PDF

Info

Publication number
AU2012101113A4
AU2012101113A4 AU2012101113A AU2012101113A AU2012101113A4 AU 2012101113 A4 AU2012101113 A4 AU 2012101113A4 AU 2012101113 A AU2012101113 A AU 2012101113A AU 2012101113 A AU2012101113 A AU 2012101113A AU 2012101113 A4 AU2012101113 A4 AU 2012101113A4
Authority
AU
Australia
Prior art keywords
receiver
command
module
blasting
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
AU2012101113A
Inventor
Craig Charles Schlenter
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Detnet South Africa Pty Ltd
Original Assignee
Detnet South Africa Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Detnet South Africa Pty Ltd filed Critical Detnet South Africa Pty Ltd
Priority claimed from PCT/ZA2011/000072 external-priority patent/WO2012061850A1/en
Application granted granted Critical
Publication of AU2012101113A4 publication Critical patent/AU2012101113A4/en
Anticipated expiration legal-status Critical
Expired legal-status Critical Current

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

A wireless blasting module which includes dual processors which process an output signal, produced in response to reception of a magnetic control signal, to control the 5 connection of an energy source to a detonator component. Fig. 1 3542753_1 (GHMatters) P90787.AU.2 25-Jul-12 10-L C\J 95 cn 0 u) n U. C)D C-) x 0 ) X ol -0 (N-

Description

AUSTRALIA Patents Act 1990 COMPLETE SPECIFICATION Innovation Patent Applicant(s): Detnet South Africa (Pty) Ltd Invention Title: Wireless blasting module The following statement is a full description of this invention, including the best method for performing it known to me/us: - 2 WIRELESS BLASTING MODULE BACKGROUND OF THE INVENTION This invention relates to a wireless blasting module for detonating an explosive charge. 5 An electronic blasting system offers better timing accuracy than a pyrotechnic or shock tube-based system. This is particularly important so in an application in which improved rock fragmentation and low vibration are dependent upon accurate timing. Nonetheless, an 10 electronic blasting system suffers from a disadvantage in that it is normally based on the use of an insulated electrical conductors or wires to interconnect electronic detonators to one another and to a control device. The wires can be broken, for example when priming the blasting 15 holes or during stemming procedures. Damage to the insulation on the wires can result in current leakage which, in turn, can impair communication capability. The wires, when positioned on an exposed surface, are also prone to damage by personnel and machinery. 20 A blasting system based on wireless techniques avoids the need for electrical conductors. However a wireless system can be expensive and there is an ongoing concern about safety levels inherent in this type of technology. US2008/0307993Al proposes wirelessly coupling 25 blasting energy into detonators at blast time so that wireless blasting modules can function at low voltages and currents before blast time. This technique does require a high power transmitter which is capable of transferring energy at the required level, through the rock which is to 30 be blasted, to the blasting modules. 3S42753_1 (GHMatters) P90787.AU.2 25-Jul-12 - 3 US4685396 is based on the use of a low voltage or low current power supply for a wireless module. Voltage step up, amplification or charging circuitry is used to charge a firing capacitor prior to blasting. This approach does 5 provide protection against directly connecting a wireless detonator battery to an initiating element but remains dependent on the circuitry not charging the firing capacitor inadvertently. This is an adverse safety factor. 10 US2010170411A1 is concerned with a military wireless initiation system for firing electrical detonators immediately upon receipt of a firing command. Use is made of dual processors, in a receiver, which are responsive to signals transmitted wirelessly from a control unit. These 15 guard against inadvertent initiation due to failure of a single processor. However the system does not include a facility for delaying the initiation of detonators relative to the receipt of a fire command and the receiver is not suitable for deployment in a blast hole. The 20 system appears to use radio frequency rather than magnetic communications and its capability of communicating through rock is severely compromised. An object of the present invention is to provide a wireless blasting module of enhanced capabilities. 25 SUMMARY OF THE INVENTION The invention provides a wireless blasting module which includes a receiver which, in response to at least one magnetic control signal transmitted in a wireless manner from a control device, produces at least one output 30 signal, at least first and second processors which process the at least one output signal, an energy source, 3542753_1 (GHMailers) P90787.AU.2 25-Ju412 -4 terminals to which a detonator component is connectable and a switching arrangement which is operative in response to a predetermined processing relationship between the first and second processors thereby to connect the energy 5 source to the terminals. The detonator component may be a detonator, or an igniter for a detonator. The use of a magnetic control signal provides an enhanced capability of establishing effective 10 communication through a body of rock. The receiver, in the wireless blasting module, may thus be deployed inside a blast hole. The blasting module may include a timer which executes a timing interval of predetermined duration. The 15 duration of the timing interval may be variable and may be programmed into the module using any suitable technique. For example the duration of the timing interval may be programmed by means of a suitable command from the control device by coupling a control signal to the module at the 20 time of deployment of the blasting module in a blast hole. The wireless blasting module may include a delay timer which inhibits the module from going into an operative mode in which blasting is possible for a period which is commenced after deployment of the module in a 25 blast system. Forward error correction techniques or any other cryptographic or coding or communication system may be employed to improve reliability of transmission of the control signal and hence to guard against unintended 30 initiation. 3542753_1 (GHMatters) P90787.AU.2 25-Jul12 - 5 The receiver may be responsive to a plurality of control signals which are repeated at intervals and which contain substantially the same information but which include time-related information which enables successive 5 signals to be differentiated from one another. At least one of the processors may include an oscillator. The oscillator may be a crystal or ceramic resonator or RC oscillator. The oscillator is calibrated close to actual blasting time to avoid drift, ideally in 10 response to a command signal from the control device. Each processor may be controlled by the same oscillator. Alternatively each processor includes a dedicated oscillator. The energy source may include a battery. An energy 15 storage device such as a capacitor may be chargeable by the battery to accumulate sufficient energy for reliable initiation of a detonator. The module may include at least one unique identifier. This may be in any suitable form and in this 20 connection use may be made of a bar-coded system, an rfid or any other suitable mechanism or technique. At least one processor may store a unique identifier. The identifier may be assigned to the module under factory conditions or on site. 25 Generally the quantity of power available at the receiver is low and communication from the wireless blasting module, positioned inside a borehole, cannot readily and reliably be effected as a result of signal attenuation by the surrounding rock mass. Thus use of the 30 module must be based on the premise that reliable one-way communication from an external controller to the receiver, 3542753_1 (GHMafters) P90787AU.2 25-Jul-12 -6 deployed in a blast hole, can be achieved. For this reason, at least, use is made of a magnetic control signal which has the capability of propagating, at least to some extent, through a body of rock; the use of redundancy 5 techniques such as repeated transmission of commands; and the detection and elimination of errors in a signal received by the receiver - an aspect which can be addressed to some extent at least by use of forward error correction codes and similar techniques. 10 The capability of transmitting in a reliable manner from an external controller to the receiver, deployed in a blast hole, means that a user-settable time delay can be assigned to the blasting module in an effective and reliable manner. 15 BRIEF DESCRIPTION OF THE DRAWINGS The invention is further described by way of example with reference to the accompanying drawings in which: Figure 1 is a schematic representation of a wireless blasting module according to one form of the invention; 20 Figure 2 illustrates a possible physical relationship between the module and a detonator and booster; and Figure 3 illustrates an established blasting system. DESCRIPTION OF PREFERRED EMBODIMENTS Figure 1 of the accompanying drawings illustrates in 25 block diagram form a circuit arrangement of a wireless blasting module 10 according to the invention. The module includes an antenna 12, a receiver/amplifier 14, a filter 16, first and second processors 18 and 20 respectively, a capacitor 24, a battery 26 and a switching arrangement 28 3542753_1 (GHMatters) P90787.AU 2 25-Jul-12 - 7 connected to output terminals 30. In use, a detonator or a detonator igniter of any appropriate construction, not shown, is connected to the terminals. Each processor may be of any suitable kind and for 5 example may be a microprocessor, an application-specific integrated circuit (ASIC), FPGA, custom-designed logic or the like. The processors may be physically separate from each other. Alternatively the processors are contained in the same package or are on the same silicon die. 10 In this embodiment the timing of each processor is controlled by an internal RC oscillator respectively dependent on (i.e. calibrated from) externally connected crystals 34 and 36. Such calibration techniques are known in the art. Each RC oscillator is used during a timing 15 interval countdown to make the system insensitive to mechanical shock, for example from adjacent explosions that may influence the crystal oscillators. The antenna 12 is a multi-directional device and modulation techniques and frequencies are chosen, as 20 appropriate, for the specific application. The receiver 14 operates at a low frequency using through-the-earth magnetic communication techniques and pulse code modulation as are described, for example, in Microchip Application Note AN232. The receiver employs automatic 25 gain techniques and strips noise through the use of filtering techniques implemented by means of analogue circuitry, through the use of DSP techniques implemented by means of digital circuitry, or by suitable software or firmware. 3542753_1 (GHMatters) P90787 AU.2 25-Jul-12 -8 The output of the receiver 14, suitably amplified, is coupled, after passing through the filter 16, to each processor 18 and 20. The switching arrangement 28 includes field effect 5 transistors 40 and 42 which are respectively connected to outputs from the processors 18 and 20 and which are used to control discharge of the capacitor through a detonator or igniter connected to the terminals 30. Referring to Figure 2 the module 10 is contained in a 10 suitable housing 50 which carries a small eyelet or hook 52. The detonator component used, e.g. a detonator 54 embedded in a booster explosive 56, is attached to the housing 50 in any appropriate way. A cord, not shown, attached to the eyelet or hook is used as a suspension 15 arrangement whereby the combination of the module and the booster can be lowered into a blast hole at a blasting site. The housing 50 protects the module 10 from the ingress of liquids and against mechanical shock. Figure 3 shows a blast site 60 which includes a 20 plurality of boreholes 62. A control device 64 is connected to an output antenna 66 which is looped around the blast site and the boreholes. The control device, which controls the blasting process, includes a processor 68, a display 70, a keyboard or any other input device 72 25 connected to the processor, a key input 74 without which the processor is inoperative, a transmitting amplifier 76 which is connected to the loop antenna 66 and a radio frequency transmitter/receiver 78 for communication purposes with other blasting equipment via an antenna 80. 3542753_1 (GHMatters) P90787.AU.2 25-Ju-12 -9 Each borehole 62 contains explosive material and one or more blasting modules with attendant detonators and boosters, according to requirement. Each module is supplied to a user point in a non 5 powered state. Typically the module is supplied with the battery 26 separate from the other components. The battery 26 may be disconnected from the remainder of the circuit electronically or by means of a physical switch. Alternatively the battery may be attached to the 10 remainder of the module by a user. A battery pull tab could be used to connect the battery to a circuit or a switch in the module could be activated, when necessary, by a user. A printed barcode, rfid or an internal identifier 15 stored in one or both of the processors is used for tracking purposes. The identifier which is assigned to the module may be unique for a particular blast and may be assigned by a programmer. Alternatively the identifier may be unique in an absolute sense and may be an 20 identifier which is supplied under factory conditions. As is shown in Figure 1 the module 10 optionally includes a programming connector 82. By connecting a suitable programming unit to the connector an electronic latching switch can be activated to power the module. It 25 is also possible to activate the module using a radio or magnetic signal but this is less desirable for the capability of activation over a distance inherently reduces the safety characteristics of the module. Firing time information for the module is supplied to 30 the programming connector 80 by means of a programming 3542753_1 (GHMatters) P90787 AU.2 25-Jul-12 - 10 machine. This can happen at any appropriate time before a fire command is sent to the module. The firing time (delay time) could be pre-programmed in a factory environment. Commands which are sent via the programming 5 connector 82 make use of appropriate acknowledgement and cyclic redundancy checks to ensure proper receipt of the commands. In another approach delay time information, originated from a programming machine, is supplied to the module in a wireless manner, for example from the control 10 device 64 to the receiver 14 using a magnetic signal this can be done reliably and effectively using a magnetic signal which can propagate through a rock body even once the module has been deployed in a blast hole. As communication between the control unit and the module is 15 in one direction only each signal which is transmitted to the module should make use of forward error correction techniques. Alternatively or additionally each signal should be repeated at least once to enhance reliability. The output of the receiver 14 is directed to each 20 processor. An important aspect of this invention is that the processors must execute a predetermined processing interactive relationship in order for reliable firing of the detonator to take place. Various techniques can be adopted in this respect and the scope of the invention is 25 by no means limited to the following examples. In one instance, as shown in Figure 1, each processor controls a separate, series-connected fire switch i.e. the transistors 40 and 42 respectively which are in series with the energy storage capacitor 24. Alternatively or 30 additionally, commands between the processors 18 and 20 must be validated. A communications link 90 between the processors enables each processor to verify the state of 3542753_1 (GHMatters) P90787.AU.2 25-JuM-12 - 11 the other processor. Another technique requires the removal of a controlled electrical short circuit over the output of the capacitor 24. Separate commands may be required for each processor so that each processor 5 produces a predetermined output signal which leads to firing of the detonator. The commands are preferably suitably encoded but the use of a preamble, forward error correction and a cyclic redundancy check is desirable to ensure reliable command reception. 10 In an alternative or additional approach a command transmitted by the control device 64 is repeated at least once but preferably a number of times. When this occurs each successive command is identical to a preceding command but contains time information to enable the 15 command to be distinguished from the preceding command. By way of example only four identical ARM commands may be transmitted at spaced time intervals. Thereafter, subject to validation and conventional control aspects, four FIRE commands may be transmitted in succession at fixed time 20 intervals. The FIRE commands may be distinguished from one another by means of information stored in the processors beforehand. For example a first fire command may be "FIRE + 3"; a second fire command may be "FIRE + 2"; a third fire command may be "FIRE + 1"; and a fourth 25 fire command may be "FIRE". Receipt of any of these commands, suitably interpreted by one or both processors means that firing must take place after three delay periods, two delay periods, one delay period, and zero delay period, as the case may be. Thus receipt of only 30 one fire command is sufficient to cause firing to take place at a desired time. The fire commands thus contain data relating to an offset time to be added to a countdown 354275_1 (GHMMers) P90787.AU 2 25,-JI12 - 12 sequence upon reception. By modifying the offset time which is sent with each successive fire command receipt of any one fire command results in an accurate execution thereof i.e. in an accurately timed firing event. 5 Similarly, substantially identical arm commands can be distinguished from each other. For calibration purposes, substantially identical STARTCALIBRATE and STOPCALIBRATE commands may respectively be distinguished from each other. 10 At least one of the processors 18 and 20 includes a software timer which generates a delay period during which detonator firing is prohibited and prevented. This can be done by directly connecting the terminals 30 to each other or by introducing an open circuit into the firing circuit, 15 during the deployment period. A similar safeguard can be achieved by making use of a hardware delay timer. If the detonator uses a fuse as an initiation element then the resistance of the fuse may be tested and reported to the programming unit which is connected to the 20 programming connector 82, during an installation phase. Other self-tests and diagnostic tests such as the voltage of the battery 26, firmware revisions and checksums of firmware and cyclic redundancy checks, can also be implemented. If the detonator is electronic, commands may 25 be sent to the detonator to establish the status and efficacy of the electronic detonator. The module preferably enters a low power state after a user-settable time delay if no wireless commands are received. The receiver circuit may optionally be turned 30 off at the same time. At user-settable intervals the receiver 14 is powered for a user-settable period during 3542753_1 (GHMalters) P90787 AU.2 25-.Jul-12 - 13 which the receiver is responsive to a signal from the control device. This technique helps to conserve energy consumption. Receipt of a control signal during a powered interval might act to postpone a following sleep period 5 or, equivalently, extend the powered interval - this is useful for example if a blast is to be commenced or a sequence of commands is to be sent to the modules and, during that interval, the modules must be responsive to all commands. 10 The use of an ARM command has been referred to. This signal is transmitted to the processors by the receiver if a time period is required for the charging of the capacitor 24 or if preparatory commands must be sent to the detonator (for example). Upon receipt of an ARM 15 command one or both processors may execute a timing interval. If a FIRE command is not forthcoming during the timing interval the module may again enter a safe state, for example by sending specific commands to the detonator component, so that the detonator component cannot be 20 fired. The capacitor 24, if charged during this period, can alternatively or additionally be discharged. The control device may also be operable to transmit a disarm command which operates in a similar manner to place the module in a safe state. 25 Commands to the processors may be repeated to enhance reliability and forward error correction techniques may be employed, as appropriate. Prior to each module/detonator assembly being placed in a blast hole a user connects each module to the 30 programming unit to enable the module. The programming unit supplies the module with a fire command which is 35427531 (GHMatters) P90787.AU 2 25-Jul-12 - 14 unique to the given blast, and a firing time. Each blast hole is loaded with explosive, as desired, and one or more modules are placed in each blast hole. Subsequently the wire loop antenna 66 is placed around the blast zone 5 (panel) and is connected to the control unit (blasting machine) which is in a safe location. The control device, possibly under the control of a wired or wireless blast coordinating machine which is communication with the control unit, supplies an 10 appropriate sequence of commands which, as indicated, may include a sequence of ARM commands followed by a sequence of FIRE commands. Each processor, upon receipt of a first validated FIRE command, adds the supplied fire offset, in the FIRE 15 command, to a local firing time and commences an adjusted firing countdown sequence. After receipt of one validated FIRE command no further wireless commands are processed. The antenna 12 and receiver 14 can be clamped to prevent interference that may occur during the blasting sequence. 20 Preferably the FIRE command includes a cryptographically secure blast identifier that must match an identifier previously loaded into the module via the programming connector 82 for the FIRE command to be considered as valid. In this way separate blasts may be 25 programmed with different blast identifiers and initiated at different times by the control unit. In an alternative approach the FIRE command which is required for initiation is supplied to the detonator by the programming unit which is connected to the programming 30 connector. This allows the detonators to be shipped with no valid FIRE command. Another possibility is for the 3542753_1 (GHMatters) P90787.AU.2 25-Jul-12 - 15 FIRE command to be randomly generated on site on a per blast basis using any suitable technique such as a cryptographically secure, pseudo random number generator in the programming unit. 5 The loop 66 may be tuned manually or automatically using appropriate techniques in order to achieve an appropriate output level so that effective coupling to the wireless detonator modules results. One such technique is to switch appropriately valued capacitors into an 10 effective LC loop resonant circuit. The required output voltage or power of the loop 66 may be calculated based on the depth of the wireless blasting modules, the expected attenuation due to the rock medium being blasted, a safety factor and the minimum 15 receiver level required by the wireless blasting modules. This can be used as the basis for a "go/no-go" decision as to whether the modules will all satisfactorily receive the signal to blast. This is an important criterion as the communication to the detonators is unidirectional. 20 It is to be understood that, if any prior art publication is referred to herein, such reference does not constitute an admission that the publication forms a part of the common general knowledge in the art, in Australia or any other country. 25 3542753_1 (GHMatlers) P90787.AU.2 25-JUl-12

Claims (5)

1. A wireless blasting module which includes a receiver which, in response to at least one magnetic control signal transmitted in a wireless manner from a control device, 5 produces at least one output signal, at least first and second processors which process the at least one output signal, an energy source, terminals to which a detonator component is connectable and a switching arrangement which is operative in response to a predetermined processing 10 relationship between the first and second processors thereby to connect the energy source to the terminals.
2. A blasting module according to claim 1 wherein the receiver is responsive to a plurality of control signals which are repeated at intervals and which contain 15 substantially the same information but which include time related information which enables successive signals to be differentiated from one another.
3. A blasting module according to claim 1 wherein the receiver is responsive to each of a plurality of 20 successive commands, wherein each command is identical to a preceding command but contains time information to enable the command to be distinguished from the preceding command whereby receipt of only one command results in an accurate execution thereof. 25
4. A blasting module according to claim 1 wherein the receiver is turned off after a user-settable time delay if no wireless commands are received and thereafter, at user settable intervals the receiver is powered for a user settable period during which the receiver is responsive to 30 a signal from the control device. 3542753_1 (GHMatters) P90787.AU.2 25-Ju-12 - 17
5. A blasting module according to claim 1 wherein upon receipt of an ARM command by the receiver at least one processor executes a timing interval and if a FIRE command is not received during the timing interval it is not 5 possible to fire the detonator component. 35427531 (GHMatters) P90787.AU 2 25-.Ju-12
AU2012101113A 2010-11-04 2011-09-23 Wireless blasting module Expired AU2012101113A4 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2010/07921 2010-11-04
PCT/ZA2011/000072 WO2012061850A1 (en) 2010-11-04 2011-09-23 Wireless blasting module

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2011/000072 Division WO2012061850A1 (en) 2010-11-04 2011-09-23 Wireless blasting module

Publications (1)

Publication Number Publication Date
AU2012101113A4 true AU2012101113A4 (en) 2012-08-23

Family

ID=46690834

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2012101113A Expired AU2012101113A4 (en) 2010-11-04 2011-09-23 Wireless blasting module

Country Status (1)

Country Link
AU (1) AU2012101113A4 (en)

Similar Documents

Publication Publication Date Title
WO2012061850A1 (en) Wireless blasting module
AU2021254605B2 (en) A wireless initiation device
KR100616806B1 (en) System for the initiation of rounds of individually delayed detonators
CA2645206C (en) Wireless electronic booster, and methods of blasting
JP6612769B2 (en) Ignition device for blasting, wireless electronic blasting system having the same, and blasting method
AU2007246164B2 (en) Methods of controlling components of blasting apparatuses, blasting apparatuses, and components thereof
AU2006225079B2 (en) Wireless detonator assembly, and methods of blasting
US7975612B2 (en) Constant-current, rail-voltage regulated charging electronic detonator
KR20010031865A (en) Controlled electromagnetic induction detonation system for initiation of a detonatable material
JP2017512968A (en) Apparatus, system and method
AU2004256313B2 (en) Detonator utilizing selection of logger mode or blaster mode based on sensed voltages
AU2009253752B2 (en) Calibration of detonators
US20230296364A1 (en) Improved communications in electronic detonators
CN105066802A (en) Remote control initiation system
AU2012393032B2 (en) Remote initiator receiver
US20050011390A1 (en) ESD-resistant electronic detonator
AU2016354618B2 (en) Wireless detonator
AU2012101113A4 (en) Wireless blasting module
AU2004256468B2 (en) Detonator arming
WO2006055991A1 (en) Detonator
EP4143500A1 (en) Wireless detonator assembly
AU2002100859A4 (en) Electronic detonator buffered connection device
WO2021229597A1 (en) An electronic system for controlled sequential detonation and method thereof
NZ603164B (en) Remote initiator receiver

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry