CN102147219B - Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system - Google Patents

Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system Download PDF

Info

Publication number
CN102147219B
CN102147219B CN 201010110640 CN201010110640A CN102147219B CN 102147219 B CN102147219 B CN 102147219B CN 201010110640 CN201010110640 CN 201010110640 CN 201010110640 A CN201010110640 A CN 201010110640A CN 102147219 B CN102147219 B CN 102147219B
Authority
CN
China
Prior art keywords
authorization
detonator
information
detonating
communication interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 201010110640
Other languages
Chinese (zh)
Other versions
CN102147219A (en
Inventor
颜景龙
张宪玉
李风国
刘星
翟伯平
白清顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong Weitian Electronic Technology Co.,Ltd.
Original Assignee
BEIJING BANGIUNION TECHNOLOGY DEVELOPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BANGIUNION TECHNOLOGY DEVELOPMENT Co Ltd filed Critical BEIJING BANGIUNION TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CN 201010110640 priority Critical patent/CN102147219B/en
Publication of CN102147219A publication Critical patent/CN102147219A/en
Application granted granted Critical
Publication of CN102147219B publication Critical patent/CN102147219B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides an electronic detonator supervision system and a detonating authorization monitoring management method of the electronic detonator supervision system. The system comprises a data center, an authorization device and a detonating device, wherein the authorization device comprises a control circuit, a nonvolatile memory, a communication interface circuit and a power conversion circuit. The monitoring management method comprises the following steps: the authorization device receives and stores the detonating authorization information sent by the data center and checks the detonating system information sent by the detonating device according to the information, if the detonating system information is qualified, the information check qualification signal is sent to the detonating device. The detonating device receives the check qualification signal and judges the detonating to be legal, then actuates the detonating procedure and completes detonating and collects the detonating information to the authorization device; and the authorization device stores and sends to the data center. Through the technical scheme, the monitoring for detonating is realized by the data center when the network transmission is obstructed, and the requirement to the detonating environment is reduced in the monitoring authorization process.

Description

Electric detonator supervisory systems and detonating authorization method for managing and monitoring thereof
Technical field
The present invention relates to the monitoring management to the civil explosive material product, relate in particular to the design to the electric detonator supervisory systems, this system of reaching carries out monitoring management to the electric detonator use procedure method.
Background technology
Detonator is to excite down at a very little firing impulse, and the detonation element of output detonation energy is the driving source that other explosive such as explosive produces detonation.Therefore, be the most important thing in the civil explosive material product monitoring management work all the time to the monitoring management of industrial detonator information flow direction.
At present, in the detonator production process, China adopts the coding marking technology of mechanical impression or laser engraving, by bar codes technique detonator coding information is changed again, and coded message collected and recorded in the computer management system, and set up corresponding computer management system in explosive circulation, use and supervision department, and corresponding compulsory execution management process with it.Selling and by IC-card detonator coding information is being bound with involving explosives unit or involving explosives personnel during circulation, produce one about the fresh information of detonator circulation in the article circulation, the overall process that makes each detonator circulate, be passed to use from producing to all is under administrative department's computer supervision.
This is the management method of detonator coding, has realized supervision and management to detonator production and intermediate links, but can't stop detonator illegally to be used.One, namely quick-fried because the traditional electrical detonator powers up, monitoring management department can't monitor the initiation process of detonator.Its two, detonator once the blast just fragmentate, its " coding " also do not existed, monitoring management department is difficult to trace the source of detonator.Its three, the Data Enter of each intermediate links is stronger to people's dependence, so there is the possibility that causes information errors or disappearance because of human factor in management link.In addition, in the detonator production process, beat code, increased the production process of detonator, and the coding mode of beating of this physical property also may be to the security formation potential threat of detonator production.
The eighties in 20th century, the developed country such as Japanese, Australian, European and the area electric detonator technology that begins one's study.Based on the two-way communication between explosion information monitoring management data center and electronic detonator initiating device, patent application document 200910000065.5 discloses a kind of system that can carry out to electronic detonator priming circuit monitoring management, this system passes through detonator product identification legitimacy, the priming device legitimacy, the operating personnel's legitimacy of detonating, the point initiation legitimacy, the monitoring management of the information such as burst time legitimacy, realized the monitoring to electric detonator use procedure legitimacy, and final by the authorization control of data center to priming device, realize the control and management to the electronic detonator initiating process.
In above-mentioned monitoring management system, data center directly carries out remote monitoring and administration to initiation process, and the legitimacy of blasting process is monitored, and the authorized party that priming device need obtain data center can carry out corresponding operating.But there is following defective in such scheme, because priming device depends on cable network or wireless network with communicating by letter of data center, therefore, when carrying out under the environment that explosion is relatively poor at communication condition or network transmission is obstructed, priming device and data center can't proper communications, this will cause system can't normally finish request and the mandate of detonating, thereby has the possibility that can't normally carry out legal explosion.
Summary of the invention
The object of the invention is to overcome the defective of above-mentioned prior art, a kind of electric detonator supervisory systems is provided, and based on the detonating authorization method for managing and monitoring of this system.Technical scheme of the present invention realized when Internet Transmission is obstructed to initiation system information verification, to the mandate of detonating and to the collecting and reporting of fuzing information, so that the impact that normally is not subjected to the Internet Transmission condition of legal explosion has reduced the requirement of monitoring licensing process to the explosion environment.
Comprise explosion information monitoring management data center, authorization device and electronic detonator initiating device in the electric detonator supervisory systems of the present invention, and, data center and authorization device two-way communication, authorization device and priming device two-way communication.Wherein, authorization device comprises control circuit, nonvolatile memory, communication interface circuit and power-switching circuit.One end of power-switching circuit is connected to an end of control circuit, an end of nonvolatile memory and an end of communication interface circuit, and power-switching circuit is respectively to control circuit, nonvolatile memory and communication interface circuit power supply; All the other of a power-switching circuit end is connected to the power supply of authorization device outside, accepts Power supply; All the other two ends of control circuit, an end is connected to communication interface circuit, and the other end is connected to nonvolatile memory; All the other ends of communication interface circuit are communication ends, and this end leads to the authorization device outside, carry out data interaction with data center or priming device.
Adopt Technical Design authorization device like this, for the two-way communication that realizes authorization device and data center or priming device provides the hardware structure condition, thereby for realizing that detonating authorization method for managing and monitoring of the present invention provides technical foundation.
Authorization device among the present invention also can adopt another kind of technical scheme to consist of, and specific as follows: authorization device comprises control circuit, nonvolatile memory, communication interface circuit and power-switching circuit.Wherein, communication interface circuit comprises communication interface one, communication interface two and communication interface commutation circuit.One end of power-switching circuit is connected to an end of control circuit, an end of nonvolatile memory, an end of communication interface one and an end of communication interface two, and power-switching circuit is to control circuit, nonvolatile memory, communication interface one and communication interface two power supplies; All the other of a power-switching circuit end is connected to the power supply of authorization device outside, accepts Power supply; Control circuit also links to each other with communication interface two with communication interface one respectively, and all the other of a control circuit end links to each other with nonvolatile memory; One end of communication interface commutation circuit links to each other with all the other ends of communication interface one, and the other end links to each other with all the other ends of communication interface two; The authorization device outside is led to respectively at all the other two ends of communication interface commutation circuit, consists of respectively control end and the communication ends of authorization device.
In this technical scheme, by the control to the communication interface commutation circuit, finish the switching to communication interface one and communication interface two, thereby finish the switching of different communication form.Therefore, no matter whether data center adopts identical communication form and authorization device to communicate with priming device, all can directly use the authorization device of the technical program and realize data interaction, thereby so that the authorization device of the technical program has better versatility.
The following detonating authorization method for managing and monitoring of above-mentioned electric detonator supervisory systems employing is realized the supervision to explosion:
(1) the authorization device receive data center explosion authorization message of sending, and be saved in its inner nonvolatile memory;
(2) priming device obtains initiation system information, and is sent to authorization device;
(3) after authorization device receives initiation system information, carry out initiation system information verification process, according to the explosion authorization message initiation system information that receives is compared, through comparison, if initiation system information is qualified, then send the qualified signal of information verification to priming device;
(4) after priming device receives the qualified signal of information verification, the preparation of detonating; Finishing detonates prepare after, priming device is carried out the process of detonating and is finished and detonate, and gathers fuzing information and be sent to authorization device;
(5) authorization device receives fuzing information, and is saved in the nonvolatile memory;
(6) data center obtains fuzing information from authorization device, finishes this detonating authorization method for managing and monitoring.
In the above-mentioned detonating authorization method for managing and monitoring, data center is at first to the legal information of this separate explosion of authorization device mandate, only have the authorization device through data center's legal authorization just to possess the ability that this separate explosion is supervised, thereby can answer the request of priming device that initiation system information is verified, to realize the mandate to priming device, priming device is finally finished detonated.The centralized control and management that this has just realized technically to priming device has also ensured the legitimacy of priming device to the electric detonator operation, and then has ensured the legitimacy of explosion.In addition, authorization device also gathers fuzing information after finishing detonating, and is sent to data center, and this has just guaranteed the completeness of the information that data center collects, and is convenient to data center explosion is verified and reviewed.
In the above-mentioned detonating authorization method for managing and monitoring, in priming device detonated the process of preparing, priming device can be carried out detonator password request process, waited for receiving the legal detonator password that authorization device sends; Simultaneously, authorization device is carried out detonator password authorization process, sends legal detonator password to priming device.After priming device receives legal detonator password, carry out detonator password detection procedure; The detonator password is qualified after testing, the then priming device preparation of proceeding to detonate, and finish detonate prepare after, carry out the process of detonating and finish and detonate.
Data center comprises following one or more content to the explosion authorization message that authorization device sends in the detonating authorization method for managing and monitoring of the present invention: the geographical location information of the identity coding information of legal priming device, legal burst region, the temporal information of legal explosion, legal operating personnel's identification authorization information, legal detonator identity code, legal detonator password and explosion allow to postpone the time limit.
The initiation system information that priming device sends to authorization device in the detonating authorization method for managing and monitoring of the present invention comprises one or more in boot-strap information, explosion positional information and the blasting network information.One or more in the identification authorization information of the temporal information when wherein, boot-strap information comprises identity coding, the start of this priming device of priming device and operating personnel's input of this priming device.One or more in the temporal information when explosion positional information comprises the on-site geographical location information of this separate explosion and gathers this geographical location information.Blasting network information can comprise the identity code of all electric detonators in this blasting circuit, also can comprise the sum of electric detonator in this blasting circuit.
Authorization device is verified priming device to the initiation system information of its transmission according to data center to the explosion authorization message of its transmission, can judge from aspects such as priming device legitimacy, point initiation legitimacy, burst time legitimacy, detonator product identification legitimacy, the operating personnel's legitimacies of detonating the legitimacy of this separate explosion.
In the detonating authorization method for managing and monitoring of the present invention, in priming device detonates the process of preparing, can be by the detection of detonator password further being judged the legitimacy of detonator product, concrete grammar is as follows:
(1) priming device is carried out detonator password request process, and authorization device is carried out detonator password authorization process, and realize request and mandate to legal detonator password: priming device is sent to authorization device with the identity code of all detonators in the blasting circuit; Authorization device is compared the identity code that receives and the legal detonator identity code in the explosion authorization message, through comparison, if qualified, then read the legal detonator password corresponding with the identity code that receives and be sent to priming device, finish detonator password authorization process; Priming device receives legal detonator password, finishes detonator password request process.
(2) priming device is carried out detonator password detection procedure, realizes the judgement to the detonator password qualification of all detonators in the networking: priming device sends the instruction that comprises the detonator password to the detonator in the blasting circuit; Detonator is compared according to the detonator password in this instruction, through comparison, if the detonator password is qualified, then returns response message to priming device; Priming device receives this response message, finishes detonator password detection procedure.This process can be avoided the illegal use of detonator effectively, has guaranteed the safety in utilization of detonator.
Description of drawings
Fig. 1 is the formation schematic diagram of electric detonator supervisory systems among the present invention;
Fig. 2 is the formation block diagram of the priming device in the electric detonator supervisory systems;
Fig. 3 is the formation schematic diagram of authorization device the first embodiment among the present invention;
Fig. 4 is the formation schematic diagram of authorization device the second embodiment among the present invention;
Fig. 5 is the schematic flow sheet of authorization device mandate monitoring and managing method among the present invention;
Fig. 6 is the schematic diagram of the detonating authorization request flow process that priming device is carried out among the present invention;
Fig. 7 is the schematic flow sheet that includes the authorization device mandate monitoring and managing method of password authorization process among the present invention;
Fig. 8 is the schematic flow sheet of the detonating authorization request flow process that matches with embodiment shown in Figure 7 among the present invention;
Fig. 9 is the schematic flow sheet of the detonator password request process of priming device among the present invention;
Figure 10 is the schematic flow sheet of the detonator password authorization process of authorization device among the present invention;
Figure 11 is the schematic flow sheet of the detonator password detection procedure of priming device among the present invention;
Figure 12 is a kind of enforcement schematic diagram of authorization device the second embodiment among the present invention.
The specific embodiment
Below in conjunction with the drawings and specific embodiments technical scheme of the present invention is described in further detail.
Electric detonator supervisory systems of the present invention comprises explosion information monitoring management data center 100, authorization device 200 and electronic detonator initiating device 300, and, data center 100 and authorization device 200 two-way communications, authorization device 200 and priming device 300 two-way communications, as shown in Figure 1.
Electronic detonator initiating device 300 can adopt disclosed technical scheme in the patent application document 200810135028.0,200810135067.0,200810147438.7,200820207912.6,200820207913.0,200810172102.6 or 200820178278.8.As shown in Figure 2, priming device 300 can comprise control module 301, Computer Communications Interface 302, power management module, signal modulation and transmission module, signal demodulation receiver module and power supply.Wherein, Computer Communications Interface 302 can be used for realizing the data interaction between priming device 300 and the authorization device 200.
Authorization device 200 in the electric detonator supervisory systems of the present invention can comprise control circuit 204, nonvolatile memory 203, communication interface circuit 202 and power-switching circuit 201, as shown in Figure 3.Wherein, power-switching circuit 201 is connected to above-mentioned all modules, to all module for power supply; All the other ends of power-switching circuit 201 are connected to the power supply of authorization device 200 outsides, accept external power source.All the other two ends of control circuit 204: an end is connected to communication interface circuit 202, and the other end is connected to nonvolatile memory 203.Control circuit 204 control communication interface circuits 202 carry out data interaction with data center 100 or the priming device 300 of outside, on the one hand, the explosion authorization message of data center's 100 transmissions or the fuzing information of priming device 300 transmissions are saved in the nonvolatile memory 203, on the other hand, canned data in the nonvolatile memory 203 is sent to data center 100 or priming device 300.All the other ends of communication interface circuit 202 are communication ends 22, and this end leads to authorization device 200 outsides, realize the data interaction with data center 100 or priming device 300.
If data center 100 adopts different signal form and authorization device 200 to communicate from priming device 300, then can adopt known signal switch technology, with a built-in or external signal translation interface signal of data center 100 or priming device 300 outputs is converted to authorization device 200 discernible signals, finishes communication.In addition, also can carry out following improvement to authorization device: as shown in Figure 4, authorization device can comprise control circuit 204, nonvolatile memory 203, communication interface circuit 202 ' and power-switching circuit 201.Wherein, communication interface circuit 202 ' further can comprise communication interface 207, communication interface 208 and communication interface commutation circuit 206.Concrete annexation is as follows: power-switching circuit 201 is connected to control circuit 204, nonvolatile memory 203, communication interface 207 and communication interface 208, to above-mentioned all module for power supply; All the other ends of power-switching circuit 201 are connected to the power supply of authorization device 200 outsides, accept Power supply.Control circuit 204 also links to each other with communication interface 208 with communication interface 207 respectively, and all the other ends of control circuit 204 link to each other with nonvolatile memory 203.One end of communication interface commutation circuit 206 links to each other with all the other ends of communication interface 207, the other end links to each other with all the other ends of communication interface 208, authorization device 200 outsides are led to respectively at all the other two ends of communication interface commutation circuit 206, consist of respectively the control end 23 and communication ends 22 of authorization device 200.
Adopt embodiment shown in Figure 4, when authorization device 200 and PERCOM peripheral communication, utilize communication interface commutation circuit 206 to realize the branch road that is connected to communication interface 207 and the switching that is connected to the branch road of communication interface 208.For example, system can be designed to: when authorization device 200 communicated with data center 100, the control end 23 of authorization device 200 connect low level, and then communication interface commutation circuit 206 is connected to the branch road conducting of communication interface 208; When authorization device 200 and priming device 300 communicated, the control end 23 of authorization device 200 connect high level, and then communication interface commutation circuit 206 is connected to the branch road conducting of communication interface 207.So just realized the flexible switching of authorization device 200 between the different communication mode.
If in communication process, data center 100 or priming device 300 can't provide to the control end 23 of authorization device 200 definite high-low level control signal, then also can on the basis of scheme shown in Figure 4, design again a pull-up circuit or pull-down circuit, by on draw or drop-down effect provides definite high level or low level control signal to communication interface commutation circuit 206.For example, in embodiment illustrated in fig. 12, design between the output that a pull-up circuit 205 is connected to control end 23 and power-switching circuit 201, then when control end 23 is in nondeterministic statement, pull-up circuit 205 will provide definite high level signal to control end 23, thus the gating branch road of control communication interface commutation circuit 206.
Pull-up circuit in above-described embodiment or pull-down circuit can design in authorization device inner, also can design in the authorization device outside, and technique effect is identical.
The detonating authorization method for managing and monitoring of electric detonator supervisory systems of the present invention can be realized monitoring management to the explosion mandate according to following steps: the explosion authorization message that send at authorization device 200 receive data centers 100, and be saved in its inner nonvolatile memory 203.Priming device 300 obtains initiation system information, and is sent to authorization device 200; After authorization device 200 receives initiation system information, carry out initiation system information verification process, according to the explosion authorization message initiation system information that receives is compared, through comparison, if initiation system information is qualified, then send the qualified signal of information verification to priming device 300.After priming device 300 receives the qualified signal of information verification, the preparation of detonating; Finishing detonates prepare after, priming device 300 is carried out the processes of detonating and is finished and detonate, and gathers fuzing information and be sent to authorization device 200; Authorization device 200 receives fuzing information, and is saved in the nonvolatile memory 203; Data center obtains fuzing information from authorization device, so far finishes this detonating authorization method for managing and monitoring.
In this detonating authorization method for managing and monitoring, the legal information of this separate explosion is at first authorized by data center 100 to authorization device 200, only have the authorization device through data center's legal authorization just to possess the ability that this separate explosion is supervised, thereby can answer the request of priming device that initiation system information is verified, to realize the mandate to priming device, priming device is finally finished detonated.The centralized control and management that this has just realized technically to priming device has also ensured the legitimacy of priming device to the operation of electric detonator, and then has ensured the legitimacy of explosion.In addition, authorization device 200 also gathers fuzing information after finishing detonating, and is sent to data center 100, and this has just guaranteed the completeness of the information that data center 100 collects, and is convenient to 100 pairs of explosions of data center and verifies and review.
As the one side of detonating authorization method for managing and monitoring of the present invention, the authorization device mandate supervision flow that authorization device is carried out can carry out according to following steps, as shown in Figure 5:
The first step, whether control circuit 204 monitorings receive the initiation system information that priming device 300 sends: if receive, then carry out second step; Otherwise, continue monitoring and receive;
Second step is carried out initiation system information verification process, judges whether above-mentioned initiation system information is qualified, and then realizes the judgement to this separate explosion legitimacy;
In the 3rd step, control circuit 204 judges whether initiation system information is all qualified through verifying: if all qualified, then send the qualified signal of information verification to priming device 300, then carried out for the 4th step; If initiation system information is defective through verifying, then send the defective signal of information verification to priming device 300, then carried out for the 6th step;
In the 4th step, receive the fuzing information that priming device 300 sends, and be saved in the nonvolatile memory 203;
In the 5th step, send fuzing information to data center 100;
In the 6th step, finish this authorization device mandate supervision flow.
As detonating authorization method for managing and monitoring of the present invention on the other hand, with authorization device mandate supervision flow shown in Figure 5 accordingly, priming device 300 is carried out detonating authorization request flow process according to following steps, to authorization device 200 request detonating authorizations, as shown in Figure 6:
Step 1, control module 301 is obtained the relevant information of this initiation system, i.e. initiation system information, and be sent to authorization device, by authorization device this information is verified;
Step 2, whether control module 301 monitorings receive the information that authorization device 200 returns: if receive, then carry out step 3; Otherwise, continue monitoring and receive;
Step 3, control module 301 judges whether the information that receives is the qualified signal of information verification: if then execution in step four; Otherwise, direct execution in step seven;
The preparation of detonating of step 4, priming device 300, control module 301 judges whether priming device 300 enters the state of detonating that allows: if then execution in step five; Otherwise, direct execution in step seven;
Step 5, priming device 300 is carried out the process of detonating, and finishes and detonates;
Step 6, priming device 300 gathers fuzing information, and is sent to the authorization device preservation;
Step 7 finishes this detonating authorization request flow process.
Authorization device mandate supervision flow shown in Figure 5 and detonating authorization request flow process shown in Figure 6 cooperatively interact, and have realized the monitoring management to the electronic detonator initiating legitimacy.Its course of work can specifically describe as follows:
(1) priming device 300 obtains initiation system information and is sent to authorization device 200, by the verification of authorization device 200 realizations to initiation system information.Above-mentioned initiation system information can comprise one or more in boot-strap information, explosion positional information and the blasting network information.One or more in the identification authorization information of the date and time information when wherein, boot-strap information can comprise identity coding, the start of this priming device of priming device and operating personnel's input of this priming device; One or more in the date and time information when explosion positional information can comprise the on-site geographical location information of this separate explosion and gather this geographical location information; Blasting network information can comprise the identity code of all electric detonators in this blasting circuit, also can comprise the sum of electric detonator in this blasting circuit.
(2) authorization device 200 is carried out initiation system information verification process, according to the explosion authorization message of data center 100 to its transmission, initiation system information is verified, and is judged according to this legitimacy that this detonates.In authorization device 200, the corresponding contents in above-mentioned initiation system information and the explosion authorization message is compared one by one.Through verifying, if initiation system information is all qualified, then authorization device 200 sends the qualified signal of information verification to priming device 300; Otherwise authorization device 200 sends the defective signal of information verification to priming device 300, and authorization device finishes to authorize supervision flow.Priming device 300 can't normally use after receiving and verifying defective signal, thereby can't be to the operation of detonating of electric detonator in the networking, and this has just been avoided the generation of illegal explosion.
(3) priming device 300 receives the qualified signal of information verification, namely show this priming device 300 for through authorize can legal use priming device, thereby can carry out a series of preparations of detonating such as networking detection to all detonators in the blasting circuit, after finishing the preparation of detonating, priming device namely enters the state of detonating that allows, and can further finish to detonate and gather fuzing information to authorization device.
(5) after authorization device 200 receives fuzing information, this information is preserved, and be sent to data center 100.These fuzing informations can comprise temporal information and the operation priming device of blasting network information, explosion positional information, priming device ignition electronic detonator and finish the operating personnel's of detonating identification authorization information and image information.This is just realized the collection of 100 pairs of whole relevant informations of this separate explosion of data center, is convenient to the verification of 100 pairs of these separate explosions of data center and reviews.
In the initiation system information verification process that above-mentioned authorization device 200 is carried out, judge the legitimacy of initiation system information according to the explosion authorization message.Above-mentioned explosion authorization message can comprise with the next item down or multinomial content: the geographical location information of the identity coding information of legal priming device, legal burst region, the temporal information of legal explosion, legal operating personnel's identification authorization information, legal detonator identity code, legal detonator password and explosion allow to postpone the time limit etc.The verification content is specific as follows:
(1) identity coding of verification priming device 300, whether judgement conforms to the identity coding information of the legal priming device of authorization device 200 interior preservations.This just can judge the legal use of priming device 300 self, thereby is conducive to guarantee the legitimacy of explosion.
Date and time information when (2) verifying priming device 300 start, whether judgement conforms to the temporal information of the legal explosion of authorization device 200 interior preservations.This just can guarantee explosion legitimacy in time.For example, explosion supervision department can set and not allow to implement explosion in red-letter days such as National Day, the Spring Festival, if the date time showing when then starting shooting is October 1, is defective to the verification result of this content then, and priming device can't normally use.
(3) verify the identification authorization information that the priming device operating personnel input, judge with the legal operating personnel's that authorize through data center identification authorization information whether conform to.To the verification of identification authorization information, the simplest mode of user name password of taking is verified.Further, can utilize biological identification technology, operating personnel's finger print information, iris information, voice messaging or people's face information etc. are verified.This has just been avoided illegal operation librarian use priming device to implement explosion, is conducive to guarantee the social safty of electric detonator.
(4) verify the on-site geographical location information of explosion, judge whether the explosion spot is in the legal burst region that data center is authorized.This just can guarantee the legitimacy in explosion place.For example, explosion supervision department can be set as illegal burst region with important places such as museum, hospital, schools, if priming device is in these zones, is defective to the verification result of geographical location information then, and priming device can't normally use.
(5) verify priming device and whether allowing to postpone in the time limit in the time interval of obtaining the explosion positional information and send between the initiation system information, thereby can further guarantee the legitimacy in explosion place.For example, in the time can't normally locating in the explosion place, can obtain geographical location information in other places in this explosion place certain limit, be used for the on-site geographical location information of explosion is verified.In this case, design this verification content and just can limit actual explosion place and obtain distance between the place of explosion positional information, ensure better the social safty of explosion.
(6) identity code of all detonators in the verification networking judges whether conform to the legal detonator identity code of authorization device 200 interior preservations.This just can guarantee the identity legitimacy of detonator product.
Above-mentioned initiation system information verification process just can realize the verification of the aspects such as legitimacy in legitimacy, the legitimacy of blasting time to priming device, the operating personnel's of detonating legitimacy, detonator product identification legitimacy or explosion place.These several respects are all verified, just can be realized time, the place to bursting work, effective control of personnel, more be conducive to social safety.
A kind of preferred version as detonating authorization method for managing and monitoring of the present invention, in the above-mentioned detonating authorization method for managing and monitoring, in priming device detonates the process of preparing, also by the detection of detonator password further being judged the legitimacy of detonator product, concrete grammar can carry out according to the following steps: priming device 300 can be carried out detonator password request process, waits for receiving the legal detonator password that authorization device 200 sends; Authorization device 200 is carried out detonator password authorization process, sends legal detonator password to priming device 300; After priming device 300 receives legal detonator password, carry out detonator password detection procedure; The detonator password is qualified after testing, then priming device 300 preparation of proceeding to detonate, and finish detonate prepare after, carry out the process of detonating and finish and detonate.
Adopt above-mentioned preferred version, the authorization device mandate supervision flow that authorization device is carried out can carry out according to following steps, as shown in Figure 7:
Steps A 1, whether control circuit 204 monitoring receives the initiation system information that priming device 300 sends: if receive, execution in step A2 then; Otherwise, continue monitoring and receive;
Steps A 2 is carried out initiation system information verification process, judges whether above-mentioned initiation system information is qualified, and then realizes the judgement to this separate explosion legitimacy;
Steps A 3, control circuit 204 judge whether initiation system information is all qualified through verifying: if all qualified, then send the qualified signal of information verification, then execution in step A4 to priming device 300; If initiation system information is defective through verifying, then send the defective signal of information verification, then execution in step A7 to priming device 300;
Steps A 4, control circuit 204 is carried out detonator password authorization process;
Steps A 5 receives the fuzing information that priming device 300 sends, and is saved in the nonvolatile memory 203;
Steps A 6 sends fuzing information to data center 100;
Steps A 7 finishes this authorization device mandate supervision flow.
With authorization device mandate supervision flow shown in Figure 7 accordingly, priming device 300 can be carried out detonating authorization request flow process according to following steps, as shown in Figure 8:
Step B1, control module 301 is obtained the relevant information of this initiation system, i.e. initiation system information, and be sent to authorization device, by authorization device this information is verified;
Step B2, whether control module 301 monitorings receive the information that authorization device 200 returns: if receive, then carry out step B3; Otherwise, continue monitoring and receive;
Step B3, control module 301 judges whether the information that receives is the qualified signal of information verification: if, execution in step B4 then; Otherwise, direct execution in step B12;
Step B4 carries out detonator password request process;
Step B5, control module 301 is judged whether priming device 300 is in and is forbidden the state of detonating: if, direct execution in step B12; Otherwise, execution in step B6;
Step B6 carries out detonator password detection procedure;
Step B7, control module 301 judges whether to exist password to detect wrong detonator: if existence, then execution in step B9; Otherwise, execution in step B8;
Step B8, priming device 300 preparation of detonating, control module 301 judges whether priming device 300 enters the state of detonating that allows: if, execution in step B10 then; Otherwise, direct execution in step B12;
Step B9, priming device 300 enter and forbid the state of detonating, then execution in step B12;
Step B10, priming device 300 is carried out the process of detonating, and finishes and detonates;
Step B11, priming device 300 gathers fuzing information, and is sent to the authorization device preservation;
Step B12 finishes this detonating authorization request flow process.
Above-mentioned steps B4 detonator password request process can be carried out according to the following steps, as shown in Figure 9:
Step C1, priming device is sent to authorization device with the identity code of all detonators in the blasting circuit, and the request authorization device carries out the detonator password authorization;
Step C2, whether priming device monitoring receives the response message that authorization device returns: if receive, execution in step C3 then; Otherwise, continue monitoring and receive;
Step C3, priming device is judged the response message that authorization device returns: if the detonator password reads successfully sign, then read and preserve authorization device to the legal detonator password of its mandate, then execution in step C4; If detonator password read error sign, then priming device enters and forbids the state of detonating, then execution in step C4;
Step C4 finishes this detonator password request process.
With the described flow process of Fig. 9 accordingly, authorization device 200 is carried out detonator password authorization process according to following steps, finishes the mandate to legal detonator password, as shown in figure 10: at first, authorization device 200 receives the detonator identity code that priming devices 300 send.Then, authorization device 200 calls legal detonator identity code its internal non-volatile memory 203 interior preservations, that authorize through data center 100, and compare with the detonator identity code that priming device 300 sends: if the identity code of certain detonator that sends belongs to the identity code of legal detonator, judge that then this detonator is legal detonator, authorization device 200 is set to the detonator password with this detonator and reads successfully sign, and the legal detonator password corresponding with the identity code of this detonator is sent to priming device 300; And if the identity code of certain detonator that sends does not belong to the identity code of legal detonator, judge that then this detonator is illegal detonator, authorization device 200 is set to detonator password read error sign with this detonator, and the random data that produces can be sent to priming device 300.So far, authorization device 200 is finished detonator password authorization process.
Priming device 300 is carried out detonator password request process, and authorization device 200 is carried out detonator password authorization process, the two realization request and mandate to legal detonator password that cooperatively interact.Priming device can be disposable sends the identity code of all detonators to authorization device, also can repeatedly send the identity code of a certain number of detonator to authorization device in batches, also can send the detonator identity code to authorization device one by one.Similarly, authorization device also can be sent to priming device with the legal detonator password of the correspondence through being judged to be legal detonator once or repeatedly in batches.
Priming device 300 is saved to these passwords in the inner buffer of control module 301 after receiving the legal detonator password that authorization device 200 sends, and corresponding one by one with identity code.Priming device 300 can continue all detonators in the networking are carried out the preparations of detonating such as networking detection, defer time setting, charging, and can be according to flow performing detonator password detection procedure as shown in figure 11, priming device sends the instruction that includes legal detonator password one by one to each electric detonator in the blasting circuit, by the detection of electric detonator realization to the detonator password.Specific as follows:
After certain electric detonator receives this instruction, at first whether the identity code in the decision instruction and this detonator is consistent, if consistent, whether the legal detonator password that then continues in the decision instruction is consistent with the password of this detonator: through comparison, if the detonator password is qualified, be that legal detonator password in the password and instruction of this detonator conforms to, then this detonator returns response message to priming device; Otherwise this detonator does not return any information, and priming device then is added to password with the information of this detonator and detects in the wrong detonator information list, and can detect wrong detonator information to operating personnel's display password.After the password of this detonator finished detection, priming device continued that next detonator is carried out the detonator password and detects.
Above-mentioned instruction for detection of the detonator password can be taken as charging instruction, writes the single instructions relevant with blasting cap initiation such as defer time instruction or prefiring instruction.Priming device 300 can according to preseting, when the detonator in the networking being charged, writing the operation of defer time or prefiring, detect the detonator password.If it is defective that the detonator password detects, then this detonator can't normally detonate, and this has just been avoided the illegal use of detonator effectively, has further guaranteed the safety in utilization of detonator.

Claims (8)

1. electric detonator supervisory systems is characterized in that:
Comprise explosion information monitoring management data center, authorization device and electronic detonator initiating device in this supervisory systems; Described data center and described authorization device two-way communication, described authorization device and described priming device two-way communication;
Wherein, described authorization device comprises control circuit, nonvolatile memory, communication interface circuit and power-switching circuit,
One end of described power-switching circuit is connected to an end of an end of described control circuit, described nonvolatile memory and an end of described communication interface circuit, and described power-switching circuit is respectively to described control circuit, described nonvolatile memory and the power supply of described communication interface circuit; All the other of a described power-switching circuit end is connected to the power supply of described authorization device outside, accepts described Power supply; All the other two ends of described control circuit, an end is connected to described communication interface circuit, and the other end is connected to described nonvolatile memory; All the other ends of described communication interface circuit are communication ends, and it is outside that this end leads to described authorization device, carries out data interaction with described data center or described priming device.
2. electric detonator supervisory systems is characterized in that:
Comprise explosion information monitoring management data center, authorization device and electronic detonator initiating device in this supervisory systems; Described data center and described authorization device two-way communication, described authorization device and described priming device two-way communication;
Wherein, described authorization device comprises control circuit, nonvolatile memory, communication interface circuit and power-switching circuit, and described communication interface circuit comprises communication interface one, communication interface two and communication interface commutation circuit,
One end of described power-switching circuit is connected to an end of an end of described control circuit, described nonvolatile memory, an end of described communication interface one and an end of described communication interface two, and described power-switching circuit is to described control circuit, described nonvolatile memory, described communication interface one and two power supplies of described communication interface; All the other of a described power-switching circuit end is connected to the power supply of described authorization device outside, accepts described Power supply; Described control circuit also links to each other with described communication interface two with described communication interface one respectively, and all the other of a described control circuit end links to each other with described nonvolatile memory; One end of described communication interface commutation circuit links to each other with all the other ends of described communication interface one, and the other end links to each other with all the other ends of described communication interface two; It is outside that described authorization device is led to respectively at all the other two ends of described communication interface commutation circuit, consists of respectively control end and the communication ends of described authorization device.
3. detonating authorization method for managing and monitoring based on claim 1 or 2 described electric detonator supervisory systems is characterized in that:
The method adopts the monitoring management of following flow process realization to detonating,
Described authorization device receives the explosion authorization message that described data center sends, and is saved in the described nonvolatile memory of its inside;
Described priming device obtains initiation system information, and is sent to described authorization device;
After described authorization device receives described initiation system information, carry out initiation system information verification process, according to described explosion authorization message the described initiation system information that receives is compared, through comparison, if described initiation system information is qualified, then send the qualified signal of information verification to described priming device;
After described priming device receives the qualified signal of described information verification, the preparation of detonating; Finish described detonate prepare after, described priming device is carried out the process of detonating and is finished and detonate, and gathers fuzing information and be sent to described authorization device;
Described authorization device receives described fuzing information, and is saved in the described nonvolatile memory;
Described data center obtains described fuzing information from described authorization device, finishes this detonating authorization method for managing and monitoring.
4. according to detonating authorization method for managing and monitoring claimed in claim 3, it is characterized in that:
Described priming device carries out in the described process of preparing of detonating, and described priming device is carried out detonator password request process, waits for receiving the legal detonator password that described authorization device sends; Simultaneously, described authorization device is carried out detonator password authorization process, sends described legal detonator password to described priming device;
After described priming device receives described legal detonator password, carry out detonator password detection procedure;
The detonator password is qualified after testing, and then described priming device is proceeded the described preparation of detonating.
5. according to claim 3 or 4 described detonating authorization method for managing and monitoring, it is characterized in that:
Described explosion authorization message comprises following one or more content:
The geographical location information of the identity coding information of legal priming device, legal burst region, the temporal information of legal explosion, legal operating personnel's identification authorization information, legal detonator identity code, described legal detonator password and explosion allow to postpone the time limit.
6. according to claim 3 or 4 described detonating authorization method for managing and monitoring, it is characterized in that:
Described initiation system information comprises one or more in boot-strap information, explosion positional information and the blasting network information; Wherein,
One or more in the identification authorization information of the temporal information when described boot-strap information comprises identity coding, the start of this priming device of described priming device and operating personnel's input of this priming device;
One or more in temporal information when described explosion positional information comprises the on-site geographical location information of this separate explosion and gathers this geographical location information;
Described blasting network information comprises the identity code of all electric detonators in the sum of electric detonator in this blasting circuit and this blasting circuit.
7. according to detonating authorization method for managing and monitoring claimed in claim 4, it is characterized in that:
Described priming device is carried out described detonator password request process, and described authorization device is carried out described detonator password authorization process, realizes request and mandate to described legal detonator password:
Described priming device is sent to described authorization device with the identity code of all detonators in the described blasting circuit;
The described identity code that described authorization device will receive and legal detonator identity code are compared; Through comparison, if qualified, then read the described legal detonator password corresponding with the described identity code that receives and be sent to described priming device; Then finish described detonator password authorization process;
Described priming device receives described legal detonator password, finishes described detonator password request process.
8. according to detonating authorization method for managing and monitoring claimed in claim 4, it is characterized in that:
Described detonator password detection procedure is carried out in accordance with the following methods,
Described priming device sends the instruction that comprises the detonator password to the detonator in the described blasting circuit; Detonator is compared according to the described detonator password in this instruction, through comparison, if the detonator password is qualified, then returns response message to described priming device;
Described priming device receives described response message, finishes this detonator password detection procedure.
CN 201010110640 2010-02-09 2010-02-09 Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system Active CN102147219B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010110640 CN102147219B (en) 2010-02-09 2010-02-09 Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010110640 CN102147219B (en) 2010-02-09 2010-02-09 Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system

Publications (2)

Publication Number Publication Date
CN102147219A CN102147219A (en) 2011-08-10
CN102147219B true CN102147219B (en) 2013-10-30

Family

ID=44421601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010110640 Active CN102147219B (en) 2010-02-09 2010-02-09 Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system

Country Status (1)

Country Link
CN (1) CN102147219B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102608960A (en) * 2011-10-25 2012-07-25 薛世忠 Explosive information collector and explosive information collection method
CN102608961B (en) * 2011-11-01 2015-11-25 薛世忠 Explosive remote monitoring equipment and method for supervising
CN105592159A (en) * 2015-12-31 2016-05-18 贵州久联民爆器材发展股份有限公司 Method of utilizing GPRS network to realize electronic detonator networked control
CN106468526B (en) * 2016-03-03 2019-02-01 阎跃鹏 Pass through the location information of GNSS and the safe initiation managing device of specified Region Matching
CN105868885A (en) * 2016-03-22 2016-08-17 融硅思创(北京)科技有限公司 Working platform for movable explosion site management
CN107606997B (en) * 2017-11-01 2019-04-12 黑龙江科技大学 A kind of intelligent interlocking initiation control method
CN109631697A (en) * 2018-11-02 2019-04-16 北京伊拜科技有限责任公司 A kind of blasting cap initiation supervision server, terminal, system and method
CN109556473B (en) * 2018-11-02 2021-08-31 北京伊拜科技有限责任公司 Industrial detonator initiator, terminal, system and method
CN110823029A (en) * 2019-09-10 2020-02-21 贵州全安密灵科技有限公司 Separated detonation control system and detonation control method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4976199A (en) * 1988-09-01 1990-12-11 Expert Explosives (Proprietary) Limited Blasting system and its method of control
CN101324413A (en) * 2008-07-28 2008-12-17 颜景龙 Detonating device and main control process flow thereof
CN101586933A (en) * 2009-01-06 2009-11-25 北京铱钵隆芯科技有限责任公司 Electronic detonator monitoring and managing system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4976199A (en) * 1988-09-01 1990-12-11 Expert Explosives (Proprietary) Limited Blasting system and its method of control
CN101324413A (en) * 2008-07-28 2008-12-17 颜景龙 Detonating device and main control process flow thereof
WO2010012214A1 (en) * 2008-07-28 2010-02-04 北京铱钵隆芯科技有限责任公司 An electronic detonator initiating device
CN101586933A (en) * 2009-01-06 2009-11-25 北京铱钵隆芯科技有限责任公司 Electronic detonator monitoring and managing system

Also Published As

Publication number Publication date
CN102147219A (en) 2011-08-10

Similar Documents

Publication Publication Date Title
CN102147219B (en) Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system
CN101586933B (en) Electronic detonator monitoring and managing system
CN101666598B (en) Digital electronic detonator blasting system and control method thereof
CN101666600B (en) Novel digital electronic detonator initiator and control method thereof
CN101666599B (en) Novel digital electronic detonator supervisory system and supervisory method thereof
CN105547062B (en) Initiation controller of electronic detonator and control method thereof
CN114646243B (en) Digital detonator initiation control method and system for improving safety
CN201527238U (en) Novel digital electronic detonator initiator
CN201561710U (en) Digital electronic detonator explosion system
CN102564248A (en) Encryption method for electronic detonators
CN110243240A (en) A kind of electronic detonator initiator by Beidou and UID code constrained and time
CN101349532A (en) Safe blasting system capable of alarming misfire information
CN1598475A (en) Controller of digital electronic detonator
CN107977568B (en) MCU safety protection identity authentication device and method
CN107563634A (en) A kind of method of explosion supervisory systems and explosion supervision based on dipper system
CN109556473B (en) Industrial detonator initiator, terminal, system and method
CN103743295A (en) Control method for realizing networking detonation of electronic detonator with single headset
CN106465044A (en) Wireless power transfer with improved device identification and signaling link security
CN207197376U (en) Digital electric detonator end control device
CN109857004A (en) A kind of digital electric detonator register method and its initiation system
CN108827095A (en) A kind of control system of wireless initiator
CN201697574U (en) Novel supervisory system for digital electronic detonators
CN102621480A (en) Nondestructive detecting method of mixed activated hardware Trojan horse in integrated circuit
CN104599378A (en) Intelligent access control system with short message validation and validation method of intelligent access control system
CN107680205A (en) Use SIM card certification and the safety device of Electronic Coding technology

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP02 Change in the address of a patent holder

Address after: 100097 Beijing city Haidian District road Jin Yuan era business center A block 11F

Patentee after: Beijing BangiUnion Technology Development Co., Ltd.

Address before: 100085 Beijing city Haidian District East Road No. 1 Yingchuang power block A Room 601

Patentee before: Beijing BangiUnion Technology Development Co., Ltd.

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20170120

Address after: 100097 Beijing city Haidian District landianchang Road business center Jin Yuan era A block 11F

Patentee after: Beijing Ebtech Co., Ltd.

Address before: 100097 Beijing city Haidian District road Jin Yuan era business center A block 11F

Patentee before: Beijing BangiUnion Technology Development Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220127

Address after: 226141 Group 8, Lianyi village, Sijia Town, Haimen District, Nantong City, Jiangsu Province

Patentee after: Nantong Weitian Electronic Technology Co.,Ltd.

Address before: 100097 11F, block a, Jinyuan times business center, lantianchang East Road, Haidian District, Beijing

Patentee before: BEIJING EBTECH TECHNOLOGY CO.,LTD.