CN101586933B - Electronic detonator monitoring and managing system - Google Patents

Electronic detonator monitoring and managing system Download PDF

Info

Publication number
CN101586933B
CN101586933B CN 200910000065 CN200910000065A CN101586933B CN 101586933 B CN101586933 B CN 101586933B CN 200910000065 CN200910000065 CN 200910000065 CN 200910000065 A CN200910000065 A CN 200910000065A CN 101586933 B CN101586933 B CN 101586933B
Authority
CN
China
Prior art keywords
information
detonating
priming device
monitoring management
processing unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 200910000065
Other languages
Chinese (zh)
Other versions
CN101586933A (en
Inventor
颜景龙
张宪玉
刘星
李风国
王璇
孟繁亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong Weitian Electronic Technology Co.,Ltd.
Original Assignee
BEIJING EBTECH Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING EBTECH Co Ltd filed Critical BEIJING EBTECH Co Ltd
Priority to CN 200910000065 priority Critical patent/CN101586933B/en
Publication of CN101586933A publication Critical patent/CN101586933A/en
Application granted granted Critical
Publication of CN101586933B publication Critical patent/CN101586933B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an electronic detonator monitoring and managing system, which comprises an electronic detonator detonating device, a blasting information monitoring and managing data center, and a monitoring and managing user terminal, wherein the user terminal is connected with the data center through network to carry out data interaction, and the detonating device is connected with the data center through the network to carry out the data interaction. The data center executes a detonating authorization management process, and the detonating device executes an authorization requestingprocess to realize monitoring and management of the detonator blasting. The data center checks information of a detonating system first, and the detonating device enters a normal usage state after be ing checked as qualified. The detonating device sends a detonating authorization request to the data center before preparing the detonation, and enters a detonating state after receiving a detonation permitting signal sent back by the data center. The system and the operation process thereof realize monitoring and management of much information of detonator legality, detonating device legality, detonating position legality, detonating time legality and the like so as to ensure social security of using the electronic detonator.

Description

Electronic detonator monitoring and managing system
Technical field
The present invention relates to the monitoring management to the civil explosive material product, relate in particular to a kind of management system that use procedure is monitored to electric detonator.
Background technology
Detonator is to excite down at a very little firing impulse, and the detonation element of output detonation energy is the driving source that other explosive such as explosive produces detonation.Therefore, be the most important thing to the monitoring management of civil explosive material product all the time to the monitoring management of industrial detonator information flow direction.
At present, in the detonator production process, China adopts the coding marking technology of mechanical impression or laser engraving, and produce 13 signs with permanent retention and uniqueness on the detonator surface digital.By bar codes technique detonator coding information is changed again, and coded message is collected and recorded in the computer management system.Then, set up corresponding computer management system in explosive circulation, use and supervision department, and set up compulsory execution management process corresponding to a cover.Selling and by IC-card detonator coding information is being bound with involving explosives unit or involving explosives personnel during circulation, produce one about the fresh information of detonator circulation in the article circulation, the overall process that makes each detonator circulate, be passed to use from producing to all is under administrative department's computer supervision.
This is the management method of detonator coding, has realized supervision and management to detonator production and intermediate links, has strengthened detonator from producing to the Responsibility of Staff that uses each link related management department.But, can't stop detonator illegally to be used.One, namely quick-fried because the traditional electrical detonator powers up, monitoring management department can't monitor the initiation process of detonator.Its two, detonator once the blast just fragmentate, its " coding " also do not existed, thus monitoring management department is difficult to trace the source of detonator.Its three, stronger to people's dependence at the Data Enter of each intermediate links, so management link exists and the possibility that human factor causes information errors or disappearance to occur.
In addition, in the detonator production process, be its dozen code, increased the production process of detonator, and the coding mode of beating of this physical property also may be to the security formation potential threat of detonator production.
The eighties in 20th century, the developed country such as Japanese, Australian, the European electric detonator technology that begins one's study.Along with the develop rapidly of electronic technology, microelectric technique, information technology, the electric detonator technology has obtained great progress.Late 1990s, electric detonator begins to be put into application test and marketing.
As the core component of electric detonator, the performance of electronic detonator control chip directly affects the performance of electric detonator.The electronic detonator control chip that provides among patent application document 200820111269.7 or 200820111270.X and the patent ZL03156912.9, realized Double wire stepless connection, the electric detonator of electric detonator and the basic function such as the two-way communication between the equipment of detonating, built-in detonator identity code, initiation process are controlled, electronic delay, more traditional detonator has had qualitative leap.Provided in the patent application document 200810135028.0 can with the implementation of the matching used electronic detonator initiating device of above electronic detonator control chip and main control process flow thereof, this technical scheme has made up the basic framework of electronic detonator initiating device, has realized the basic function with priming devices such as electric detonator two-way communication, ignition electronic detonators.
Patent application document 200810135067.0,200810147438.7,200820207913.0,200820207912.6,200810172102.6 and the electronic detonator initiating device that provides in 200820178278.8, on the basis of patent application document 200810135028.0, further improve, be added to respectively network transmission module, the black box module, positioner, photographic means, Computer Communications Interface, with the biological information recognition device, thereby so that the electronic detonator initiating device can obtain the information relevant with blasting circuit all sidedly, and can realize two-way communication with the blasting circuit outside.
Summary of the invention
The two-way communication of electric detonator and its priming device has realized the control of priming device to the electronic detonator initiating process.The two-way communication of priming device and electronic detonator priming circuit outside, so that managing the automatic monitoring of electronic detonator priming circuit, the outside becomes possibility, thereby so that outside can control detonating of electric detonator, and then to electric detonator use concentrate, monitor in real time and management becomes possibility.
The object of the invention is to solve the defective of above-mentioned prior art, a kind of system that can carry out to electronic detonator priming circuit monitoring management is provided.This system is by the monitoring management to many information such as detonator product identification legitimacy, priming device legitimacy, the operating personnel's legitimacy of detonating, point initiation legitimacy, burst time legitimacies, realized the control to electric detonator use procedure legitimacy, final by the remote authorization control to priming device, realize the control and management to the electronic detonator initiating process, and provide technical guarantee for the control of tracing to the source to detonator simultaneously.
Electronic detonator monitoring and managing system of the present invention comprises electronic detonator initiating device, explosion information monitoring management data center and monitoring management user terminal.Wherein, the monitoring management user terminal is connected with data center by network, carries out data interaction; The electronic detonator initiating device is connected with data center by network, carries out data interaction.
As the one side of technical solution of the present invention, the central processing unit at explosion information monitoring management data center is finished monitoring and management to the electronic detonator initiating process by carrying out following detonating authorization management process:
The first step receives the initiation system information that priming device sends: if receive this initiation system information, then continue to carry out second step; If do not receive, then continue this step and wait for reception.
Second step, central processing unit are carried out initiation system information verification process.
In the 3rd step, central processing unit is judged the state of pre-warning mark: if verify mark of conformity, then continued to carry out the 4th step; If verify defective sign, then carried out for the 8th step.
In the 4th step, central processing unit is carried out user terminal information and is confirmed process.
In the 5th step, central processing unit is carried out the request authorization process of detonating.
In the 6th step, central processing unit is judged the state of detonating authorization sign, if allow to detonate sign, then continues to carry out for the 7th step; If do not allow the sign that detonates, then carried out for the 8th step.
In the 7th step, central processing unit is carried out fuzing information and is gathered process.
In the 8th step, finish this detonating authorization management process.
As technical solution of the present invention on the other hand, the following priming device authorization requests flow process of the control module of electronic detonator initiating device inside execution is finished to the authorization requests of monitoring management data center:
Step e 1, control module are obtained initiation system information.
Step e 2, control module sends initiation system information to monitoring management data center.
Step e 3, control module receives the information that monitoring management data center sends: if receive, then carry out step e 4; If do not receive, then continue this step and wait for reception.
Step e 4, control module is judged the information that receives: if the qualified signal of information verification then enters normal use priming device state, then execution in step E5; If the defective signal of information verification then enters the priming device state that bans use of, then execution in step E10.
Step e 5, control module sends the detonating authorization request to monitoring management data center.
Step e 6, control module receives the information that monitoring management data center sends: if receive, then carry out step e 7; If do not receive, then continue this step and wait for reception.
Step e 7, control module is judged the information that receives: if allow time break, then priming device enters the detonating capsule state of preparing; Then execution in step E8; If do not allow time break, then priming device enters and forbids the detonating capsule state; Then execution in step E10.
Step e 8, priming device is carried out the process of detonating, and finishes and detonates.
Step e 9, control module sends fuzing information to monitoring management data center.
Step e 10 finishes this priming device authorization requests flow process.
The detonating authorization management process is carried out at above-mentioned explosion information monitoring management data center, and the electronic detonator initiating device is carried out the authorization requests flow process, thereby has realized monitoring and management to electronic detonator blasting.
Central processing unit in the data center is at first verified the initiation system information that priming device is sent, and sends to priming device verifying the result.Priming device can enter normal operating condition, otherwise priming device will enter the state that bans use of after only receiving the qualified signal of verification that data center beams back, and can't control the electric detonator in the blasting circuit.This has just realized the centralized control and management to priming device technically, ensures priming device to the legitimacy of the operation of electric detonator by data center, thereby has ensured the legitimacy of explosion.Further, these initiation system information can comprise one or more in the boot-strap information, explosion positional information, blasting network information of priming device, and this just can verify the legitimacy of this separate explosion from the legitimacy of the legitimacy of blasting time, explosion position, the legitimacy, one or more angles such as legitimacy of detonator of priming device the blasting network.These information all collect and are sent to data center by priming device when starting shooting or after the start.
After priming device receives and verifies qualified signal, can carry out to electric detonator the preparations of detonating such as networking detection, defer time setting, detector for electronic detonator network charging, but priming device enter prepare to detonate before, also must send the detonating authorization request to data center, and, need after receiving the permission time break that data center beams back, can enter the state of detonating.This just can guarantee that the explosion of blasting circuit obtains the mandate of monitoring management data center, otherwise priming device will make electronic detonator priming circuit enter safe condition automatically.This has further guaranteed again the legitimacy of explosion.
The initiation system information verification process at explosion information monitoring management data center is carried out according to following steps:
Initiation system information is obtained and preserved to steps A 1.
Steps A 2, central processing unit sends instruction to user terminal, makes it to show pre-warning mark.
Steps A 3, the presupposed information of storing in the memory module of central processing unit according to data center, judge whether initiation system information is all qualified: if all qualified, execution in step A4 then; If not all qualified, execution in step A6 then.
Steps A 4, central processing unit are put pre-warning mark for verifying mark of conformity; And to monitoring management user terminal transmission instruction, pre-warning mark is shown as the verification mark of conformity.
Steps A 5, central processing unit sends the qualified signal of information verification to priming device; Then execution in step A8.
Steps A 6, central processing unit are put pre-warning mark for verifying defective sign; And to monitoring management user terminal transmission instruction, pre-warning mark is shown as the defective sign of verification.
Steps A 7, central processing unit sends the defective signal of information verification to priming device; Then execution in step A8.
Steps A 8, central processing unit is preserved early warning information, and early warning information is sent to user terminal displays.
Steps A 9 finishes this initiation system information verification process.
Priming device is to the initiation system information that data center sends, and can comprise one or more in boot-strap information, explosion positional information or the blasting network information.One or more in the authorization message of the date and time information when wherein, boot-strap information can be identity coding, the start of this priming device of electronic detonator initiating device or operating personnel's input of this priming device.Wherein, the explosion positional information is the on-site geographical location information of this blasting circuit, can collect by the positioner of priming device inside.Blasting network information is the identity code of all electric detonators in the sum of electric detonator in this blasting circuit and/or this blasting circuit.And the authorization message of operating personnel input can further comprise via the username and password of the human-computer interaction module input of this priming device inside or via in finger print information, iris information, voice messaging or the people's face information of the biological information acquisition device input of this priming device inside one or more in the above-mentioned boot-strap information.
The presupposed information of storing in the memory module of data center can comprise one or more in the identity code information of the date temporal information of the geographical location information of the identity coding information of legal priming device, legal operating personnel's authorization message, legal burst region, legal blasting time or legal electric detonator.Accordingly, the authorization message that is preset in data center also can further comprise one or more in legal operating personnel's username and password, these personnel's finger print information, iris information, voice messaging or the people's face information.
Data center carries out above-mentioned initiation system information verification process, corresponding information in priming device the initiation system information of sending and the memory module that is pre-stored in data center is compared, legitimacy to priming device in the blasting circuit and electric detonator is verified checking, thereby guarantee that this separate explosion through legal mandate, by the qualified blast operations personnel of qualification, at the when and where that allows, to the explosion that legal electric detonator carries out, further guarantees the social safty that electric detonator uses.
The user terminal information affirmation process at explosion information monitoring management data center is carried out according to following steps:
Step B1, central processing unit receive the information that user terminal sends: if receive that user terminal is sent, put pre-warning mark for verifying the information of defective sign, then execution in step B2; If do not receive, execution in step B4 then.
Step B2, central processing unit put pre-warning mark for verifying defective sign; And to monitoring management user terminal transmission instruction, pre-warning mark is shown as the defective sign of verification; Then execution in step B3.
Step B3, central processing unit receives the detonating authorization request that priming device sends: if receive this detonating authorization request, then execution in step B5; If do not receive, then continue this step and wait for reception.
Step B4, central processing unit receives the detonating authorization request that priming device sends: if receive this detonating authorization request, then execution in step B5; If do not receive, then return step B1.
Step B5 finishes this user terminal information and confirms process.
Carry out user terminal information and confirm process, allow the monitoring management personnel artificially pre-warning mark to be set to by the monitoring management user terminal and verify defective sign, thereby forbid that this time detonate.This has just realized the larger supervision of monitoring management personnel to electronic detonator blasting.In addition, the monitoring management personnel can only forbid this separate explosion artificially, and can not allow artificially this separate explosion, the possibility of illegally detonating of also having avoided human factor to bring.
Data center carries out the request authorization process of detonating according to following steps after receiving the detonating authorization request that priming device sends to it:
Step C1, central processing unit sends instruction to user terminal, makes it to show the detonating authorization sign.
Step C2, central processing unit is judged the state of pre-warning mark: if verify mark of conformity, then continue execution in step C3; If verify defective sign, then continue execution in step C5.
Step C3, central processing unit put detonating authorization and are masked as and allow to detonate sign; And send instruction to the monitoring management user terminal, the detonating authorization sign is shown as allows to detonate sign.
Step C4 sends the permission time break to priming device; Then execution in step C7.
Step C5, central processing unit put detonating authorization and are masked as and do not allow to detonate sign; And send instruction to the monitoring management user terminal, the detonating authorization sign is shown as does not allow to detonate sign.
Step C6 does not allow time break to the priming device transmission; Then execution in step C7.
Step C7, central processing unit is preserved detonating authorization information, and detonating authorization information is sent to user terminal displays.
Step C8 finishes originally to detonate the request authorization process.
After central processing unit in the data center receives the detonating authorization request that priming device sends, confirm the execution result of process according to initiation system information verification process and user terminal information, namely the state of pre-warning mark judges whether to allow this separate explosion.If pre-warning mark then allows this separate explosion for verifying mark of conformity, and to priming device transmission permission time break; Otherwise, send to priming device and not allow time break, forbid that this time detonate.This has just further realized the control of data center to electronic detonator blasting, thereby has further guaranteed the legitimacy of explosion.
After priming device receives the permission time break that data center sends, namely enter the state that detonates of preparing.Finish detonate after, priming device also is sent to data center with the fuzing information that gets access to.Data center gathers fuzing information according to following steps after receiving this fuzing information:
Step D1, central processing unit receive the fuzing information that priming device sends: if receive this fuzing information, and execution in step D2 then; If do not receive, then continue this step and wait for reception.
Step D2, central processing unit put the Status Flag that detonates and are the complete sign that detonates; And to monitoring management user terminal transmission instruction, the Status Flag that will detonate is shown as the complete sign that detonates.
Step D3, central processing unit is preserved fuzing information, and fuzing information is sent to user terminal displays.
Step D4 finishes this fuzing information and gathers process.
The fuzing information that above-mentioned priming device sends to data center, the date and time information and the operation priming device that comprise the priming device ignition electronic detonator are finished the personnel's of detonating image information, and wherein image information is by the photographic means collection in the priming device.To gathering of these fuzing informations, so that the information about this separate explosion of storing in the data center is more complete, and, collect and finish the image information of priming device operating personnel when detonating, also can more guarantee the legitimacy of explosion, and provide foundation for tracing to the source of explosion.
Description of drawings
Fig. 1 is the general frame of electronic detonator monitoring and managing system of the present invention;
Fig. 2 is the flow chart that fuzing information gathers process among the present invention;
Fig. 3 is the flow chart of detonating authorization management process among the present invention;
Fig. 4 is the flow chart of initiation system information verification process among the present invention;
Fig. 5 is the flow chart that user terminal information is confirmed process among the present invention;
Fig. 6 detonates among the present invention to ask the flow chart of authorization process;
Fig. 7 is the flow chart of priming device authorization requests flow process among the present invention.
The specific embodiment
Below in conjunction with the drawings and specific embodiments technical scheme of the present invention is described in further details.
Electronic detonator monitoring and managing system of the present invention as shown in Figure 1, comprises electronic detonator initiating device, explosion information monitoring management data center and monitoring management user terminal.Wherein, the monitoring management user terminal is connected with data center by network, carries out data interaction; The electronic detonator initiating device is connected with data center by network, carries out data interaction.
The realization of technical solution of the present invention, based on the technical scheme of the electronic detonator control chip that provides among patent application document 200820111269.7 or 200820111270.X and the patent ZL03156912.9, and the technical scheme of the electronic detonator initiating device that provides in the patent application document 200810135028.0,200810135067.0,200810147438.7,200820207913.0,200820207912.6,200810172102.6 or 200820178278.8.
As the one side of technical solution of the present invention, the central processing unit at explosion information monitoring management data center is finished monitoring management to the explosion of electric detonator by carrying out following detonating authorization management process, such as Fig. 3:
The first step receives the initiation system information that priming device sends: if receive this initiation system information, then continue to carry out second step; If do not receive, then continue this step and wait for reception.
Second step, central processing unit are carried out initiation system information verification process.
In the 3rd step, central processing unit is judged the result that above-mentioned information verification process is carried out, and namely judges the state of pre-warning mark: if verify mark of conformity, then continued to carry out the 4th step; If verify defective sign, then carried out for the 8th step.
In the 4th step, central processing unit is carried out user terminal information and is confirmed process, allows the monitoring management personnel that initiation system information is reaffirmed.
In the 5th step, central processing unit is carried out the request authorization process of detonating.
In the 6th step, central processing unit is judged the result that the above-mentioned request authorization process of detonating is carried out, and namely judges the state of detonating authorization sign, if allow to detonate sign, then continues to carry out for the 7th step; If do not allow the sign that detonates, then carried out for the 8th step.
In the 7th step, central processing unit is carried out fuzing information and is gathered process.
In the 8th step, finish this detonating authorization management process.
As technical solution of the present invention on the other hand, the control module of electronic detonator initiating device inside is carried out following priming device authorization requests flow process and is finished to the authorization requests of monitoring management data center, such as Fig. 7:
Step e 1, after the priming device start, control module is at first obtained initiation system information.
Step e 2, control module sends to monitoring management data center to the initiation system information that gets access to.
Step e 3, control module receives the information that monitoring management data center sends: if receive, then carry out step e 4; If do not receive, then continue this step and wait for reception.
Step e 4, control module is judged the information that receives: if the qualified signal of information verification then enters normal use priming device state, then execution in step E5; If the defective signal of information verification then enters the priming device state that bans use of, then execution in step E10.
Step e 5, control module sends the detonating authorization request to monitoring management data center.
Step e 6, control module receives the information that monitoring management data center sends: if receive, then carry out step e 7; If do not receive, then continue this step and wait for reception.
Step e 7, control module is judged the information that receives: if allow time break, then priming device enters the detonating capsule state of preparing; Then execution in step E8; If do not allow time break, then priming device enters and forbids the detonating capsule state, and priming device makes detector for electronic detonator network get back to safe condition; Then execution in step E10.
Step e 8, priming device wait for that operating personnel press the anti-misoperation switch, carry out the process of detonating, and finish and detonate.
Step e 9, control module sends fuzing information to monitoring management data center.
Step e 10 finishes this priming device authorization requests flow process.
Detonating authorization management process shown in Figure 3 and priming device authorization requests flow process shown in Figure 7 cooperatively interact, and have realized the monitoring management of data center to the legitimacy of electronic detonator priming circuit.Its course of work is described below:
(1) priming device obtains the relevant information of initiation system, and sends it to explosion information monitoring management data center, for data center these information is checked.
(2) data center's execution initiation system information verification process is verified the initiation system information that priming device sends, and judges whether these information are all qualified, judges according to this whether this detonates legal.If all qualified through verifying initiation system information, then data center sends the qualified signal of information verification to priming device, so that priming device enters normal operating condition; Otherwise data center sends the defective signal of information verification to priming device, so that priming device enters the state that bans use of, and data center withdraws from the detonating authorization management process.The control module control priming device of priming device inside enters normal operating condition or bans use of state, can be accomplished in several ways.For example, a certain state flag bit of priming device inside can be defined as " priming device use state flag bit ".When this flag bit is 1, be the normal priming device state that uses; When this flag bit is 0, for banning use of the priming device state.It should " priming device use state flag bit " be that " 1 " still is " 0 " that control module detects, thereby determined that priming device enters normal operating condition or bans use of state.Can't normally use through verifying underproof priming device, thereby can't implement explosion to the electric detonator in the networking, this has just guaranteed the legitimacy of explosion.
(3) after priming device enters normal operating condition, can carry out the blasting circuit operations such as the networking is detected, charging control, detonator inquiry.Meanwhile, data center carries out user terminal information and confirms process, allows the monitoring management personnel by the state of monitoring management user terminal modification pre-warning mark, forbids that artificially this time detonate.This just provides technological means for the monitoring management personnel to the supervision of explosion.
(4) before priming device entered the state of detonating, priming device sent the detonating authorization request to data center.Data center judges whether to allow this separate explosion according to the state of pre-warning mark.If pre-warning mark then allows this time to detonate for verifying mark of conformity, and sends the permission time break to priming device.After priming device receives this signal, enter the detonating capsule state that allows.At this moment, priming device can enter prepares the state that detonates, and finally finishes this separate explosion.If pre-warning mark does not then allow this time to detonate for verifying defective sign, data center sends out to priming device and does not allow time break, forbids the detonating capsule state so that priming device enters.The control module control priming device of priming device inside enters and allows the detonating capsule state or forbid the detonating capsule state, can be accomplished in several ways.For example, a certain state flag bit of priming device inside can be defined as " detonating capsule state flag bit ".When this flag bit is 1, for allowing the detonating capsule state; When this flag bit is 0, for forbidding the detonating capsule state.The control module detection should " detonating capsule state flag bit " be that " 1 " still is " 0 ", thereby determined that priming device enters permission detonating capsule state or forbids the detonating capsule state.The legitimacy of electronic detonator blasting has been guaranteed in the design of this flow process of detonating authorization request, and then has guaranteed the social safty that detonator uses.
(5) priming device finish detonate after, also fuzing information is sent to data center and gathers, thereby realized the collection of data center to this separate explosion full detail, be convenient to verify and review.
Data center carries out initiation system information verification process according to following steps, priming device verified to the initiation system information that it sends, as shown in Figure 4:
Steps A 1, the central processing unit of data center obtains and preserves initiation system information.This initiation system information comprises one or more in boot-strap information, explosion positional information or the blasting network information.One or more in the authorization message of the date and time information when wherein, boot-strap information can comprise identity coding, the start of this priming device of electronic detonator initiating device or operating personnel's input of this priming device.Wherein, the explosion positional information is the on-site geographical location information of this blasting circuit, can collect by the positioner of priming device inside.Blasting network information is the identity code of all electric detonators in the sum of electric detonator in this blasting circuit and/or this blasting circuit.And the authorization message of operating personnel input can further comprise via the username and password of the human-computer interaction module input of this priming device inside or via in finger print information, iris information, voice messaging or the people's face information of the biological information acquisition device input of this priming device inside one or more in the above-mentioned boot-strap information.
Steps A 2, central processing unit sends instruction to user terminal, makes it to show pre-warning mark, notes in order to point out the supervisor.
Steps A 3, the presupposed information of storing in the memory module of central processing unit according to data center, judge whether initiation system information is all qualified: if all qualified, execution in step A4 then; If not all qualified, execution in step A6 then.Wherein, the presupposed information of storing can comprise one or more in the identity code information of the date temporal information of the geographical location information of the identity coding information of legal priming device, legal operating personnel's authorization message, legal burst region, legal blasting time or legal electric detonator.Accordingly, the authorization message that is preset in data center also can further comprise one or more in legal operating personnel's username and password, these personnel's finger print information, iris information, voice messaging or the people's face information.
Steps A 4, central processing unit are put pre-warning mark for verifying mark of conformity; And to monitoring management user terminal transmission instruction, pre-warning mark is shown as the verification mark of conformity.
Steps A 5, central processing unit sends the qualified signal of information verification to priming device, makes priming device enter normal operating condition; Then execution in step A8.
Steps A 6, central processing unit are put pre-warning mark for verifying defective sign; And to monitoring management user terminal transmission instruction, pre-warning mark is shown as the defective sign of verification.
Steps A 7, central processing unit sends the defective signal of information verification to priming device, priming device is entered ban use of state; Then execution in step A8.
Steps A 8, central processing unit is preserved early warning information, and early warning information is sent to user terminal displays.
Steps A 9 finishes this initiation system information verification process.
Be that priming device sends to whether qualified verification result of the initiation system information of data center and these information in the early warning information of user terminal displays, date and time information during such as the identity coding of the electronic detonator initiating device in the boot-strap information, priming device start or operating personnel's authorization message, the on-site geographical location information of this blasting circuit, the identity code of electric detonator sum and/or each electric detonator in the blasting circuit.
Data center is to the verification process of initiation system information, and visual blasting circuit situation and Internet Transmission situation are optionally verified boot-strap information, explosion positional information or blasting network information.For example, if there is positioner can gather the explosion positional information on the priming device, then this information can be used as the one side of verification; If the finger print information harvester is arranged on the priming device, then finger print information can be used as the one side of verification.Again for example, if blasting circuit detonator number is few, and the Internet Transmission channel situation is better, and then priming device can all be sent to data center for verifying with the identity code of detonator sum and each detonator in the blasting circuit; If the identity code data volume of each detonator is larger in the blasting circuit, and Internet Transmission transmission speed is slower, then can only detonator sum in the blasting circuit be sent to data center for verifying.
In addition, data center can at first verify boot-strap information and explosion positional information (if there is) the verification process of initiation system information.Because the data volume of each detonator identity code is less in the relative blasting circuit of the data volume of these information, in case there is defective information in verifying these information, then this time detonated and must be under an embargo.Therefore, can view network situation select whether still the identity code of each detonator in the blasting circuit to be verified.
In addition, when the geographical location information of default legal burst region, can introduce safety and prohibit the concept in quick-fried zone, namely with some important area, the location periphery such as the government offices such as Tian An-men, Zhongnanhai, quick-fried zone is prohibited in the public place periphery conduct such as school, hospital, and its geographical location information is made as illegal burst region.So just ensured more reliably the social safty of electronic detonator blasting.
Under the qualified prerequisite of initiation system information verification, data center carries out user terminal information according to following steps and confirms process, as shown in Figure 5:
Step B1, central processing unit receive the information that user terminal sends: if receive that user terminal is sent, put pre-warning mark for verifying the information of defective sign, then execution in step B2; If do not receive, execution in step B4 then.
Step B2, central processing unit put pre-warning mark for verifying defective sign; And to monitoring management user terminal transmission instruction, pre-warning mark is shown as the defective sign of verification; Then execution in step B3.
Step B3, central processing unit receives the detonating authorization request that priming device sends: if receive this detonating authorization request, then execution in step B5; If do not receive, then continue this step and wait for reception.
Step B4, central processing unit receives the detonating authorization request that priming device sends: if receive this detonating authorization request, then execution in step B5; If do not receive, then return step B1.
Step B5 finishes this user terminal information and confirms process.
Data center carries out user terminal information and confirms process, allows the monitoring management personnel artificially pre-warning mark to be set to by the monitoring management user terminal and verifies defective sign, thereby forbid that this time detonate.This has just realized the larger supervision of monitoring management personnel to electronic detonator blasting.In addition, the monitoring management personnel can only forbid this separate explosion artificially, and can not allow artificially this separate explosion, the possibility of illegally detonating of also having avoided human factor to bring.
Usually, after the execution in step A2 of data center made it to show pre-warning mark to the user terminal transmitted signal, the monitoring management personnel namely should begin to pay close attention to the early warning information that this time detonated, and and then need to judge whether the people for forbidding this separate explosion.For avoiding the monitoring management personnel because leaving the post in time not see early warning information, perhaps for seeing that in time early warning information must be constantly on duty, can in this system, introduce the mobile communications device such as mobile phone as the part of user terminal.Data center is to send SMS message or other mobile communication, and the mobile communications device of handing to the monitoring management personnel sends early warning information, points out its operation.
After priming device is finished the operations to blasting circuit such as networking detection, clock alignment, detonator inquiry, send the detonating authorization request to data center, the request data center allows it to enter the state that detonates of preparing.After data center receives this detonating authorization request, carry out the request authorization process of detonating according to following steps, as shown in Figure 6:
Step C1, central processing unit sends instruction to user terminal, makes it to show the detonating authorization sign.
Step C2, central processing unit is judged the state of pre-warning mark: if verify mark of conformity, then continue execution in step C3; If verify defective sign, then continue execution in step C5.
Step C3, central processing unit put detonating authorization and are masked as and allow to detonate sign; And send instruction to the monitoring management user terminal, the detonating authorization sign is shown as allows to detonate sign.
Step C4 sends the permission time break to priming device; Then execution in step C7.
Step C5, central processing unit put detonating authorization and are masked as and do not allow to detonate sign; And send instruction to the monitoring management user terminal, the detonating authorization sign is shown as does not allow to detonate sign.
Step C6 does not allow time break to the priming device transmission; Then execution in step C7.
Step C7, central processing unit is preserved detonating authorization information, and detonating authorization information is sent to user terminal displays.
Step C8 finishes originally to detonate the request authorization process.
After central processing unit in the data center receives the detonating authorization request that priming device sends, confirm the execution result of process according to initiation system information verification process and user terminal information, namely the state of pre-warning mark judges whether to allow this separate explosion.If pre-warning mark then allows this separate explosion for verifying mark of conformity, and to priming device transmission permission time break; Otherwise, send to priming device and not allow time break, forbid that this time detonate.This has just further realized the control of data center to electronic detonator blasting, thereby has further guaranteed the legitimacy of explosion.
After priming device receives the permission time break that data center sends, namely enter the state that detonates of preparing.Finish detonate after, priming device also is sent to data center with the fuzing information that gets access to.Data center gathers fuzing information according to following steps after receiving this fuzing information, as shown in Figure 2:
Step D1, central processing unit receive the fuzing information that priming device sends: if receive this fuzing information, and execution in step D2 then; If do not receive, then continue this step and wait for reception.
Step D2, central processing unit put the Status Flag that detonates and are the complete sign that detonates; And to monitoring management user terminal transmission instruction, the Status Flag that will detonate is shown as the complete sign that detonates.
Step D3, central processing unit is preserved fuzing information, and fuzing information is sent to user terminal displays.
Step D4 finishes this fuzing information and gathers process.
The fuzing information that above-mentioned priming device sends to data center, the date and time information and the operation priming device that comprise the priming device ignition electronic detonator are finished the personnel's of detonating image information, and wherein image information is by the photographic means collection in the priming device.To gathering of these fuzing informations, so that the information about this separate explosion of storing in the data center is more complete, and, collect and finish the image information of priming device operating personnel when detonating, also can more guarantee the legitimacy of explosion, and provide foundation for tracing to the source of explosion.

Claims (13)

1. electronic detonator monitoring and managing system is characterized in that:
This system comprises electronic detonator initiating device, explosion information monitoring management data center and monitoring management user terminal,
Described monitoring management user terminal is connected with described data center by network, carries out data interaction;
Described electronic detonator initiating device is connected with described data center by network, carries out data interaction;
The following detonating authorization management process of central processing unit execution at described explosion information monitoring management data center is finished the monitoring management to the explosion of described electric detonator,
The first step receives the initiation system information that described priming device sends: if receive this initiation system information, then continue to carry out second step; If do not receive, then continue this step and wait for reception;
Second step, described central processing unit are carried out initiation system information verification process;
In the 3rd step, described central processing unit is judged the state of pre-warning mark: if verify mark of conformity, then continued to carry out the 4th step; If verify defective sign, then carried out for the 8th step;
In the 4th step, described central processing unit is carried out user terminal information and is confirmed process;
In the 5th step, described central processing unit is carried out the request authorization process of detonating;
In the 6th step, described central processing unit is judged the state of detonating authorization sign, if allow to detonate sign, then continues to carry out for the 7th step; If do not allow the sign that detonates, then carried out for the 8th step;
In the 7th step, described central processing unit is carried out fuzing information and is gathered process;
In the 8th step, finish this detonating authorization management process.
2. according to monitoring management system claimed in claim 1, it is characterized in that:
The described initiation system information verification process of described second step is carried out according to following steps,
Described initiation system information is obtained and preserved to steps A 1;
Steps A 2, described central processing unit sends instruction to described user terminal, makes it to show described pre-warning mark;
Steps A 3, described central processing unit judges according to the presupposed information of storing in the memory module of described data center whether described initiation system information is all qualified: if all qualified, execution in step A4 then; If not all qualified, execution in step A6 then;
It is described verification mark of conformity that steps A 4, described central processing unit are put described pre-warning mark; And to described monitoring management user terminal transmission instruction, described pre-warning mark is shown as described verification mark of conformity;
Steps A 5, described central processing unit sends the qualified signal of information verification to described priming device; Then execution in step A8;
It is the defective sign of described verification that steps A 6, described central processing unit are put described pre-warning mark; And to described monitoring management user terminal transmission instruction, described pre-warning mark is shown as the defective sign of described verification;
Steps A 7, described central processing unit sends the defective signal of information verification to described priming device; Then execution in step A8;
Steps A 8, described central processing unit is preserved early warning information, and described early warning information is sent to described user terminal displays;
Steps A 9 finishes this initiation system information verification process.
3. according to monitoring management system claimed in claim 2, it is characterized in that:
In the described steps A 3, be stored in the described presupposed information in the described memory module, comprise one or more in the identity code information of the date temporal information of the geographical location information of the identity coding information of legal priming device, legal operating personnel's authorization message, legal burst region, legal blasting time or legal electric detonator.
4. according to monitoring management system claimed in claim 3, it is characterized in that:
Described authorization message comprises one or more in described legal operating personnel's username and password, these operating personnel's finger print information, iris information, voice messaging or the people's face information.
5. according to monitoring management system claimed in claim 1, it is characterized in that:
The described user terminal information affirmation process in described the 4th step is carried out according to following steps,
Step B1, described central processing unit receives the information that described user terminal sends: if receive that described user terminal is sent, put the information that described pre-warning mark is the defective sign of described verification, then execution in step B2; If do not receive, execution in step B4 then;
It is the defective sign of described verification that step B2, described central processing unit put described pre-warning mark; And to described monitoring management user terminal transmission instruction, described pre-warning mark is shown as the defective sign of described verification; Then execution in step B3;
Step B3, described central processing unit receive the detonating authorization request that described priming device sends: if receive this detonating authorization request, then execution in step B5; If do not receive, then continue this step and wait for reception;
Step B4, described central processing unit receive the described detonating authorization request that described priming device sends: if receive this detonating authorization request, then execution in step B5; If do not receive, then return described step B1;
Step B5 finishes this user terminal information and confirms process.
6. according to monitoring management system claimed in claim 1, it is characterized in that:
The described request authorization process of detonating in described the 5th step is carried out according to following steps,
Step C1, described central processing unit sends instruction to described user terminal, makes it to show the detonating authorization sign;
Step C2, described central processing unit is judged the state of described pre-warning mark: if described verification mark of conformity then continues execution in step C3; If the defective sign of described verification then continues execution in step C5;
Step C3, described central processing unit put described detonating authorization and are masked as the described sign that allows to detonate; And to described monitoring management user terminal transmission instruction, described detonating authorization sign is shown as the described sign that allows to detonate;
Step C4 sends the permission time break to described priming device; Then execution in step C7;
Step C5, described central processing unit put described detonating authorization and are masked as the described sign that detonates that do not allow; And to described monitoring management user terminal transmission instruction, described detonating authorization sign is shown as the described sign that detonates that do not allow;
Step C6 does not allow time break to described priming device transmission; Then execution in step C7;
Step C7, described central processing unit is preserved detonating authorization information, and described detonating authorization information is sent to described user terminal displays;
Step C8 finishes originally to detonate the request authorization process.
7. according to monitoring management system claimed in claim 1, it is characterized in that:
The described fuzing information in described the 7th step gathers process to carry out according to following steps,
Step D1, described central processing unit receives the fuzing information that described priming device sends: if receive this fuzing information, execution in step D2 then; If do not receive, then continue this step and wait for reception;
Step D2, described central processing unit put the Status Flag that detonates and are the complete sign that detonates; And to described monitoring management user terminal transmission instruction, the described Status Flag that detonates is shown as the described complete sign that detonates;
Step D3, described central processing unit is preserved described fuzing information, and described fuzing information is sent to described user terminal displays;
Step D4 finishes this fuzing information and gathers process.
8. according to claim 1 or 2 described monitoring management systems, it is characterized in that:
Described priming device sends to the described initiation system information of described monitoring management data center, comprises one or more in boot-strap information, explosion positional information or the blasting network information;
One or more in the authorization message of the date and time information when wherein, described boot-strap information is identity coding, the start of this priming device of described electronic detonator initiating device or operating personnel's input of this priming device;
Wherein, described explosion positional information is described priming device collects by its inner positioner, the on-site geographical location information of this blasting circuit;
Wherein, the identity code of all described electric detonators in the described blasting network information sum that is electric detonator in this blasting circuit and/or this blasting circuit.
9. according to claim 1 or 7 described monitoring management systems, it is characterized in that:
Described fuzing information comprise described priming device detonate described electric detonator date and time information and operate the image information that described priming device is finished the personnel of detonating.
10. electronic detonator monitoring and managing system is characterized in that:
This system comprises electronic detonator initiating device, explosion information monitoring management data center and monitoring management user terminal,
Described monitoring management user terminal is connected with described data center by network, carries out data interaction;
Described electronic detonator initiating device is connected with described data center by network, carries out data interaction;
The control module of described electronic detonator initiating device inside is carried out following priming device authorization requests flow process and is finished to the authorization requests of described monitoring management data center,
Step e 1, described control module is obtained initiation system information;
Step e 2, described control module sends described initiation system information to described monitoring management data center;
Step e 3, described control module receive the information that described monitoring management data center sends: if receive, then carry out step e 4; If do not receive, then continue this step and wait for reception;
Step e 4, described control module is judged the information that receives:
If the qualified signal of information verification then enters normal use priming device state; Then execution in step E5;
If the defective signal of information verification then enters the priming device state that bans use of; Then execution in step E10;
Step e 5, described control module sends described detonating authorization request to described monitoring management data center;
Step e 6, described control module receive the information that described monitoring management data center sends: if receive, then carry out step e 7; If do not receive, then continue this step and wait for reception;
Step e 7, described control module is judged the information that receives:
If the permission time break, then described priming device enters the detonating capsule state of preparing; Then execution in step E8;
If do not allow time break, then described priming device enters and forbids the detonating capsule state; Then execution in step E10;
Step e 8, described priming device is carried out the process of detonating, and finishes and detonates;
Step e 9, described control module sends described fuzing information to described monitoring management data center;
Step e 10 finishes this priming device authorization requests flow process.
11. according to monitoring management system claimed in claim 10, it is characterized in that:
Described priming device sends to the described initiation system information of described monitoring management data center, comprises one or more in boot-strap information, explosion positional information or the blasting network information;
One or more in the authorization message of the date and time information when wherein, described boot-strap information is identity coding, the start of this priming device of described electronic detonator initiating device or operating personnel's input of this priming device;
Wherein, described explosion positional information is described priming device collects by its inner positioner, the on-site geographical location information of this blasting circuit;
Wherein, the identity code of all described electric detonators in the described blasting network information sum that is electric detonator in this blasting circuit and/or this blasting circuit.
12. according to the described monitoring management system of claim 11, it is characterized in that:
Described authorization message comprises one or more in priming device operating personnel's username and password, these operating personnel's finger print information, iris information, voice messaging or the people's face information.
13. according to monitoring management system claimed in claim 10, it is characterized in that:
Described fuzing information comprise described priming device detonate described electric detonator date and time information and operate the image information that described priming device is finished the personnel of detonating.
CN 200910000065 2009-01-06 2009-01-06 Electronic detonator monitoring and managing system Active CN101586933B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910000065 CN101586933B (en) 2009-01-06 2009-01-06 Electronic detonator monitoring and managing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910000065 CN101586933B (en) 2009-01-06 2009-01-06 Electronic detonator monitoring and managing system

Publications (2)

Publication Number Publication Date
CN101586933A CN101586933A (en) 2009-11-25
CN101586933B true CN101586933B (en) 2013-05-29

Family

ID=41371281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910000065 Active CN101586933B (en) 2009-01-06 2009-01-06 Electronic detonator monitoring and managing system

Country Status (1)

Country Link
CN (1) CN101586933B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102147219B (en) * 2010-02-09 2013-10-30 北京北方邦杰科技发展有限公司 Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system
CN102607339B (en) * 2011-08-05 2015-04-15 薛世忠 Intelligent detonator and intelligent detonating method for explosives
CN102608958B (en) * 2011-08-05 2014-11-19 薛世忠 Bulk explosive monitoring system and method
WO2013020455A1 (en) * 2011-08-05 2013-02-14 Xue Shizhong Bulk explosive monitoring system and monitoring method
CN102608959B (en) * 2011-08-05 2015-03-18 薛世忠 Explosive monitoring system and method
CN103134399B (en) * 2013-02-08 2015-06-24 前进民爆股份有限公司 On-line detection device for digital electronic detonators and method thereof
CN105592159A (en) * 2015-12-31 2016-05-18 贵州久联民爆器材发展股份有限公司 Method of utilizing GPRS network to realize electronic detonator networked control
CN106468526B (en) * 2016-03-03 2019-02-01 阎跃鹏 Pass through the location information of GNSS and the safe initiation managing device of specified Region Matching
CN108827095B (en) * 2018-06-19 2019-12-20 京工博创(北京)科技有限公司 Control system of wireless detonator
CN109631697A (en) * 2018-11-02 2019-04-16 北京伊拜科技有限责任公司 A kind of blasting cap initiation supervision server, terminal, system and method
CN112212751A (en) * 2020-10-12 2021-01-12 长园共创电力安全技术股份有限公司 Blasting error prevention system, blasting error prevention method and storage medium
CN113282049A (en) * 2021-04-09 2021-08-20 北京伊拜科技有限责任公司 Exploder and detonating equipment management and control system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6311621B1 (en) * 1996-11-01 2001-11-06 The Ensign-Bickford Company Shock-resistant electronic circuit assembly
CN101114161A (en) * 2007-08-28 2008-01-30 朱俊英 Safe type intelligent electric detonator control system and control method thereof
CN201041481Y (en) * 2007-03-21 2008-03-26 煤炭科学研究总院爆破技术研究所 Explosion-separating type electromagnetic exploder
CN101324413A (en) * 2008-07-28 2008-12-17 颜景龙 Detonating device and main control process flow thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6311621B1 (en) * 1996-11-01 2001-11-06 The Ensign-Bickford Company Shock-resistant electronic circuit assembly
CN201041481Y (en) * 2007-03-21 2008-03-26 煤炭科学研究总院爆破技术研究所 Explosion-separating type electromagnetic exploder
CN101114161A (en) * 2007-08-28 2008-01-30 朱俊英 Safe type intelligent electric detonator control system and control method thereof
CN101324413A (en) * 2008-07-28 2008-12-17 颜景龙 Detonating device and main control process flow thereof

Also Published As

Publication number Publication date
CN101586933A (en) 2009-11-25

Similar Documents

Publication Publication Date Title
CN101586933B (en) Electronic detonator monitoring and managing system
CN102147219B (en) Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system
CN109764779B (en) Digital electronic detonator detonation system and method based on double-wire bus
CN101666599B (en) Novel digital electronic detonator supervisory system and supervisory method thereof
CN102457845B (en) Wireless traffic identity identifying method, equipment and system
CN104785503B (en) Self-destruction micro-system and self-destruction method thereof for non-volatile memory chip self-destruction
EP1782019B1 (en) Blasting system and method of controlling a blasting operation
CN102564248B (en) Encryption method for electronic detonators
CN108253855A (en) It is a kind of that there is the control device for detonation of electric detonator of management and control and management-control method
CN103118032A (en) Method, terminals and server for synchronization of terminal login accounts
CN106131057A (en) Certification based on virtual reality scenario and device
CN114646243B (en) Digital detonator initiation control method and system for improving safety
CN104899490A (en) Terminal positioning method and user terminal
CN110243240A (en) A kind of electronic detonator initiator by Beidou and UID code constrained and time
CN109556473B (en) Industrial detonator initiator, terminal, system and method
CN107872433A (en) A kind of auth method and its equipment
CN109631697A (en) A kind of blasting cap initiation supervision server, terminal, system and method
CN114111486B (en) Electronic detonator initiation device and working method thereof
CN107563634A (en) A kind of method of explosion supervisory systems and explosion supervision based on dipper system
CN106017239A (en) High-safety electronic detonator initiation system and method thereof
CN108955436A (en) A kind of digital electric priming device
CN109857004A (en) A kind of digital electric detonator register method and its initiation system
CN105187419B (en) A kind of authorization method, device, terminal and system
CN201697574U (en) Novel supervisory system for digital electronic detonators
CN110992054A (en) Payment auxiliary confirmation method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP02 Change in the address of a patent holder

Address after: 100097 Beijing city Haidian District road Jin Yuan era business center A block 11F

Patentee after: Beijing Ebtech Co., Ltd.

Address before: 100085 Beijing city Haidian District East Road No. 1 Yingchuang power block A Room 601

Patentee before: Beijing Ebtech Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220117

Address after: 226141 Group 8, Lianyi village, Sijia Town, Haimen District, Nantong City, Jiangsu Province

Patentee after: Nantong Weitian Electronic Technology Co.,Ltd.

Address before: 100097 11F, block a, Jinyuan times business center, lantianchang Road, Haidian District, Beijing

Patentee before: BEIJING EBTECH TECHNOLOGY CO.,LTD.