Summary of the invention
The object of the invention is to overcome the defective of above-mentioned prior art, a kind of electric detonator supervisory systems is provided, and based on the detonating authorization method for managing and monitoring of this system.Technical scheme of the present invention realized when Internet Transmission is obstructed to initiation system information verification, to the mandate of detonating and to the collecting and reporting of fuzing information, so that the impact that normally is not subjected to the Internet Transmission condition of legal explosion has reduced the requirement of monitoring licensing process to the explosion environment.
Comprise explosion information monitoring management data center, authorization device and electronic detonator initiating device in the electric detonator supervisory systems of the present invention, and, data center and authorization device two-way communication, authorization device and priming device two-way communication.Wherein, authorization device comprises control circuit, nonvolatile memory, communication interface circuit and power-switching circuit.One end of power-switching circuit is connected to an end of control circuit, an end of nonvolatile memory and an end of communication interface circuit, and power-switching circuit is respectively to control circuit, nonvolatile memory and communication interface circuit power supply; All the other of a power-switching circuit end is connected to the power supply of authorization device outside, accepts Power supply; All the other two ends of control circuit, an end is connected to communication interface circuit, and the other end is connected to nonvolatile memory; All the other ends of communication interface circuit are communication ends, and this end leads to the authorization device outside, carry out data interaction with data center or priming device.
Adopt Technical Design authorization device like this, for the two-way communication that realizes authorization device and data center or priming device provides the hardware structure condition, thereby for realizing that detonating authorization method for managing and monitoring of the present invention provides technical foundation.
Authorization device among the present invention also can adopt another kind of technical scheme to consist of, and specific as follows: authorization device comprises control circuit, nonvolatile memory, communication interface circuit and power-switching circuit.Wherein, communication interface circuit comprises communication interface one, communication interface two and communication interface commutation circuit.One end of power-switching circuit is connected to an end of control circuit, an end of nonvolatile memory, an end of communication interface one and an end of communication interface two, and power-switching circuit is to control circuit, nonvolatile memory, communication interface one and communication interface two power supplies; All the other of a power-switching circuit end is connected to the power supply of authorization device outside, accepts Power supply; Control circuit also links to each other with communication interface two with communication interface one respectively, and all the other of a control circuit end links to each other with nonvolatile memory; One end of communication interface commutation circuit links to each other with all the other ends of communication interface one, and the other end links to each other with all the other ends of communication interface two; The authorization device outside is led to respectively at all the other two ends of communication interface commutation circuit, consists of respectively control end and the communication ends of authorization device.
In this technical scheme, by the control to the communication interface commutation circuit, finish the switching to communication interface one and communication interface two, thereby finish the switching of different communication form.Therefore, no matter whether data center adopts identical communication form and authorization device to communicate with priming device, all can directly use the authorization device of the technical program and realize data interaction, thereby so that the authorization device of the technical program has better versatility.
The following detonating authorization method for managing and monitoring of above-mentioned electric detonator supervisory systems employing is realized the supervision to explosion:
(1) the authorization device receive data center explosion authorization message of sending, and be saved in its inner nonvolatile memory;
(2) priming device obtains initiation system information, and is sent to authorization device;
(3) after authorization device receives initiation system information, carry out initiation system information verification process, according to the explosion authorization message initiation system information that receives is compared, through comparison, if initiation system information is qualified, then send the qualified signal of information verification to priming device;
(4) after priming device receives the qualified signal of information verification, the preparation of detonating; Finishing detonates prepare after, priming device is carried out the process of detonating and is finished and detonate, and gathers fuzing information and be sent to authorization device;
(5) authorization device receives fuzing information, and is saved in the nonvolatile memory;
(6) data center obtains fuzing information from authorization device, finishes this detonating authorization method for managing and monitoring.
In the above-mentioned detonating authorization method for managing and monitoring, data center is at first to the legal information of this separate explosion of authorization device mandate, only have the authorization device through data center's legal authorization just to possess the ability that this separate explosion is supervised, thereby can answer the request of priming device that initiation system information is verified, to realize the mandate to priming device, priming device is finally finished detonated.The centralized control and management that this has just realized technically to priming device has also ensured the legitimacy of priming device to the electric detonator operation, and then has ensured the legitimacy of explosion.In addition, authorization device also gathers fuzing information after finishing detonating, and is sent to data center, and this has just guaranteed the completeness of the information that data center collects, and is convenient to data center explosion is verified and reviewed.
In the above-mentioned detonating authorization method for managing and monitoring, in priming device detonated the process of preparing, priming device can be carried out detonator password request process, waited for receiving the legal detonator password that authorization device sends; Simultaneously, authorization device is carried out detonator password authorization process, sends legal detonator password to priming device.After priming device receives legal detonator password, carry out detonator password detection procedure; The detonator password is qualified after testing, the then priming device preparation of proceeding to detonate, and finish detonate prepare after, carry out the process of detonating and finish and detonate.
Data center comprises following one or more content to the explosion authorization message that authorization device sends in the detonating authorization method for managing and monitoring of the present invention: the geographical location information of the identity coding information of legal priming device, legal burst region, the temporal information of legal explosion, legal operating personnel's identification authorization information, legal detonator identity code, legal detonator password and explosion allow to postpone the time limit.
The initiation system information that priming device sends to authorization device in the detonating authorization method for managing and monitoring of the present invention comprises one or more in boot-strap information, explosion positional information and the blasting network information.One or more in the identification authorization information of the temporal information when wherein, boot-strap information comprises identity coding, the start of this priming device of priming device and operating personnel's input of this priming device.One or more in the temporal information when explosion positional information comprises the on-site geographical location information of this separate explosion and gathers this geographical location information.Blasting network information can comprise the identity code of all electric detonators in this blasting circuit, also can comprise the sum of electric detonator in this blasting circuit.
Authorization device is verified priming device to the initiation system information of its transmission according to data center to the explosion authorization message of its transmission, can judge from aspects such as priming device legitimacy, point initiation legitimacy, burst time legitimacy, detonator product identification legitimacy, the operating personnel's legitimacies of detonating the legitimacy of this separate explosion.
In the detonating authorization method for managing and monitoring of the present invention, in priming device detonates the process of preparing, can be by the detection of detonator password further being judged the legitimacy of detonator product, concrete grammar is as follows:
(1) priming device is carried out detonator password request process, and authorization device is carried out detonator password authorization process, and realize request and mandate to legal detonator password: priming device is sent to authorization device with the identity code of all detonators in the blasting circuit; Authorization device is compared the identity code that receives and the legal detonator identity code in the explosion authorization message, through comparison, if qualified, then read the legal detonator password corresponding with the identity code that receives and be sent to priming device, finish detonator password authorization process; Priming device receives legal detonator password, finishes detonator password request process.
(2) priming device is carried out detonator password detection procedure, realizes the judgement to the detonator password qualification of all detonators in the networking: priming device sends the instruction that comprises the detonator password to the detonator in the blasting circuit; Detonator is compared according to the detonator password in this instruction, through comparison, if the detonator password is qualified, then returns response message to priming device; Priming device receives this response message, finishes detonator password detection procedure.This process can be avoided the illegal use of detonator effectively, has guaranteed the safety in utilization of detonator.
The specific embodiment
Below in conjunction with the drawings and specific embodiments technical scheme of the present invention is described in further detail.
Electric detonator supervisory systems of the present invention comprises explosion information monitoring management data center 100, authorization device 200 and electronic detonator initiating device 300, and, data center 100 and authorization device 200 two-way communications, authorization device 200 and priming device 300 two-way communications, as shown in Figure 1.
Electronic detonator initiating device 300 can adopt disclosed technical scheme in the patent application document 200810135028.0,200810135067.0,200810147438.7,200820207912.6,200820207913.0,200810172102.6 or 200820178278.8.As shown in Figure 2, priming device 300 can comprise control module 301, Computer Communications Interface 302, power management module, signal modulation and transmission module, signal demodulation receiver module and power supply.Wherein, Computer Communications Interface 302 can be used for realizing the data interaction between priming device 300 and the authorization device 200.
Authorization device 200 in the electric detonator supervisory systems of the present invention can comprise control circuit 204, nonvolatile memory 203, communication interface circuit 202 and power-switching circuit 201, as shown in Figure 3.Wherein, power-switching circuit 201 is connected to above-mentioned all modules, to all module for power supply; All the other ends of power-switching circuit 201 are connected to the power supply of authorization device 200 outsides, accept external power source.All the other two ends of control circuit 204: an end is connected to communication interface circuit 202, and the other end is connected to nonvolatile memory 203.Control circuit 204 control communication interface circuits 202 carry out data interaction with data center 100 or the priming device 300 of outside, on the one hand, the explosion authorization message of data center's 100 transmissions or the fuzing information of priming device 300 transmissions are saved in the nonvolatile memory 203, on the other hand, canned data in the nonvolatile memory 203 is sent to data center 100 or priming device 300.All the other ends of communication interface circuit 202 are communication ends 22, and this end leads to authorization device 200 outsides, realize the data interaction with data center 100 or priming device 300.
If data center 100 adopts different signal form and authorization device 200 to communicate from priming device 300, then can adopt known signal switch technology, with a built-in or external signal translation interface signal of data center 100 or priming device 300 outputs is converted to authorization device 200 discernible signals, finishes communication.In addition, also can carry out following improvement to authorization device: as shown in Figure 4, authorization device can comprise control circuit 204, nonvolatile memory 203, communication interface circuit 202 ' and power-switching circuit 201.Wherein, communication interface circuit 202 ' further can comprise communication interface 207, communication interface 208 and communication interface commutation circuit 206.Concrete annexation is as follows: power-switching circuit 201 is connected to control circuit 204, nonvolatile memory 203, communication interface 207 and communication interface 208, to above-mentioned all module for power supply; All the other ends of power-switching circuit 201 are connected to the power supply of authorization device 200 outsides, accept Power supply.Control circuit 204 also links to each other with communication interface 208 with communication interface 207 respectively, and all the other ends of control circuit 204 link to each other with nonvolatile memory 203.One end of communication interface commutation circuit 206 links to each other with all the other ends of communication interface 207, the other end links to each other with all the other ends of communication interface 208, authorization device 200 outsides are led to respectively at all the other two ends of communication interface commutation circuit 206, consist of respectively the control end 23 and communication ends 22 of authorization device 200.
Adopt embodiment shown in Figure 4, when authorization device 200 and PERCOM peripheral communication, utilize communication interface commutation circuit 206 to realize the branch road that is connected to communication interface 207 and the switching that is connected to the branch road of communication interface 208.For example, system can be designed to: when authorization device 200 communicated with data center 100, the control end 23 of authorization device 200 connect low level, and then communication interface commutation circuit 206 is connected to the branch road conducting of communication interface 208; When authorization device 200 and priming device 300 communicated, the control end 23 of authorization device 200 connect high level, and then communication interface commutation circuit 206 is connected to the branch road conducting of communication interface 207.So just realized the flexible switching of authorization device 200 between the different communication mode.
If in communication process, data center 100 or priming device 300 can't provide to the control end 23 of authorization device 200 definite high-low level control signal, then also can on the basis of scheme shown in Figure 4, design again a pull-up circuit or pull-down circuit, by on draw or drop-down effect provides definite high level or low level control signal to communication interface commutation circuit 206.For example, in embodiment illustrated in fig. 12, design between the output that a pull-up circuit 205 is connected to control end 23 and power-switching circuit 201, then when control end 23 is in nondeterministic statement, pull-up circuit 205 will provide definite high level signal to control end 23, thus the gating branch road of control communication interface commutation circuit 206.
Pull-up circuit in above-described embodiment or pull-down circuit can design in authorization device inner, also can design in the authorization device outside, and technique effect is identical.
The detonating authorization method for managing and monitoring of electric detonator supervisory systems of the present invention can be realized monitoring management to the explosion mandate according to following steps: the explosion authorization message that send at authorization device 200 receive data centers 100, and be saved in its inner nonvolatile memory 203.Priming device 300 obtains initiation system information, and is sent to authorization device 200; After authorization device 200 receives initiation system information, carry out initiation system information verification process, according to the explosion authorization message initiation system information that receives is compared, through comparison, if initiation system information is qualified, then send the qualified signal of information verification to priming device 300.After priming device 300 receives the qualified signal of information verification, the preparation of detonating; Finishing detonates prepare after, priming device 300 is carried out the processes of detonating and is finished and detonate, and gathers fuzing information and be sent to authorization device 200; Authorization device 200 receives fuzing information, and is saved in the nonvolatile memory 203; Data center obtains fuzing information from authorization device, so far finishes this detonating authorization method for managing and monitoring.
In this detonating authorization method for managing and monitoring, the legal information of this separate explosion is at first authorized by data center 100 to authorization device 200, only have the authorization device through data center's legal authorization just to possess the ability that this separate explosion is supervised, thereby can answer the request of priming device that initiation system information is verified, to realize the mandate to priming device, priming device is finally finished detonated.The centralized control and management that this has just realized technically to priming device has also ensured the legitimacy of priming device to the operation of electric detonator, and then has ensured the legitimacy of explosion.In addition, authorization device 200 also gathers fuzing information after finishing detonating, and is sent to data center 100, and this has just guaranteed the completeness of the information that data center 100 collects, and is convenient to 100 pairs of explosions of data center and verifies and review.
As the one side of detonating authorization method for managing and monitoring of the present invention, the authorization device mandate supervision flow that authorization device is carried out can carry out according to following steps, as shown in Figure 5:
The first step, whether control circuit 204 monitorings receive the initiation system information that priming device 300 sends: if receive, then carry out second step; Otherwise, continue monitoring and receive;
Second step is carried out initiation system information verification process, judges whether above-mentioned initiation system information is qualified, and then realizes the judgement to this separate explosion legitimacy;
In the 3rd step, control circuit 204 judges whether initiation system information is all qualified through verifying: if all qualified, then send the qualified signal of information verification to priming device 300, then carried out for the 4th step; If initiation system information is defective through verifying, then send the defective signal of information verification to priming device 300, then carried out for the 6th step;
In the 4th step, receive the fuzing information that priming device 300 sends, and be saved in the nonvolatile memory 203;
In the 5th step, send fuzing information to data center 100;
In the 6th step, finish this authorization device mandate supervision flow.
As detonating authorization method for managing and monitoring of the present invention on the other hand, with authorization device mandate supervision flow shown in Figure 5 accordingly, priming device 300 is carried out detonating authorization request flow process according to following steps, to authorization device 200 request detonating authorizations, as shown in Figure 6:
Step 1, control module 301 is obtained the relevant information of this initiation system, i.e. initiation system information, and be sent to authorization device, by authorization device this information is verified;
Step 2, whether control module 301 monitorings receive the information that authorization device 200 returns: if receive, then carry out step 3; Otherwise, continue monitoring and receive;
Step 3, control module 301 judges whether the information that receives is the qualified signal of information verification: if then execution in step four; Otherwise, direct execution in step seven;
The preparation of detonating of step 4, priming device 300, control module 301 judges whether priming device 300 enters the state of detonating that allows: if then execution in step five; Otherwise, direct execution in step seven;
Step 5, priming device 300 is carried out the process of detonating, and finishes and detonates;
Step 6, priming device 300 gathers fuzing information, and is sent to the authorization device preservation;
Step 7 finishes this detonating authorization request flow process.
Authorization device mandate supervision flow shown in Figure 5 and detonating authorization request flow process shown in Figure 6 cooperatively interact, and have realized the monitoring management to the electronic detonator initiating legitimacy.Its course of work can specifically describe as follows:
(1) priming device 300 obtains initiation system information and is sent to authorization device 200, by the verification of authorization device 200 realizations to initiation system information.Above-mentioned initiation system information can comprise one or more in boot-strap information, explosion positional information and the blasting network information.One or more in the identification authorization information of the date and time information when wherein, boot-strap information can comprise identity coding, the start of this priming device of priming device and operating personnel's input of this priming device; One or more in the date and time information when explosion positional information can comprise the on-site geographical location information of this separate explosion and gather this geographical location information; Blasting network information can comprise the identity code of all electric detonators in this blasting circuit, also can comprise the sum of electric detonator in this blasting circuit.
(2) authorization device 200 is carried out initiation system information verification process, according to the explosion authorization message of data center 100 to its transmission, initiation system information is verified, and is judged according to this legitimacy that this detonates.In authorization device 200, the corresponding contents in above-mentioned initiation system information and the explosion authorization message is compared one by one.Through verifying, if initiation system information is all qualified, then authorization device 200 sends the qualified signal of information verification to priming device 300; Otherwise authorization device 200 sends the defective signal of information verification to priming device 300, and authorization device finishes to authorize supervision flow.Priming device 300 can't normally use after receiving and verifying defective signal, thereby can't be to the operation of detonating of electric detonator in the networking, and this has just been avoided the generation of illegal explosion.
(3) priming device 300 receives the qualified signal of information verification, namely show this priming device 300 for through authorize can legal use priming device, thereby can carry out a series of preparations of detonating such as networking detection to all detonators in the blasting circuit, after finishing the preparation of detonating, priming device namely enters the state of detonating that allows, and can further finish to detonate and gather fuzing information to authorization device.
(5) after authorization device 200 receives fuzing information, this information is preserved, and be sent to data center 100.These fuzing informations can comprise temporal information and the operation priming device of blasting network information, explosion positional information, priming device ignition electronic detonator and finish the operating personnel's of detonating identification authorization information and image information.This is just realized the collection of 100 pairs of whole relevant informations of this separate explosion of data center, is convenient to the verification of 100 pairs of these separate explosions of data center and reviews.
In the initiation system information verification process that above-mentioned authorization device 200 is carried out, judge the legitimacy of initiation system information according to the explosion authorization message.Above-mentioned explosion authorization message can comprise with the next item down or multinomial content: the geographical location information of the identity coding information of legal priming device, legal burst region, the temporal information of legal explosion, legal operating personnel's identification authorization information, legal detonator identity code, legal detonator password and explosion allow to postpone the time limit etc.The verification content is specific as follows:
(1) identity coding of verification priming device 300, whether judgement conforms to the identity coding information of the legal priming device of authorization device 200 interior preservations.This just can judge the legal use of priming device 300 self, thereby is conducive to guarantee the legitimacy of explosion.
Date and time information when (2) verifying priming device 300 start, whether judgement conforms to the temporal information of the legal explosion of authorization device 200 interior preservations.This just can guarantee explosion legitimacy in time.For example, explosion supervision department can set and not allow to implement explosion in red-letter days such as National Day, the Spring Festival, if the date time showing when then starting shooting is October 1, is defective to the verification result of this content then, and priming device can't normally use.
(3) verify the identification authorization information that the priming device operating personnel input, judge with the legal operating personnel's that authorize through data center identification authorization information whether conform to.To the verification of identification authorization information, the simplest mode of user name password of taking is verified.Further, can utilize biological identification technology, operating personnel's finger print information, iris information, voice messaging or people's face information etc. are verified.This has just been avoided illegal operation librarian use priming device to implement explosion, is conducive to guarantee the social safty of electric detonator.
(4) verify the on-site geographical location information of explosion, judge whether the explosion spot is in the legal burst region that data center is authorized.This just can guarantee the legitimacy in explosion place.For example, explosion supervision department can be set as illegal burst region with important places such as museum, hospital, schools, if priming device is in these zones, is defective to the verification result of geographical location information then, and priming device can't normally use.
(5) verify priming device and whether allowing to postpone in the time limit in the time interval of obtaining the explosion positional information and send between the initiation system information, thereby can further guarantee the legitimacy in explosion place.For example, in the time can't normally locating in the explosion place, can obtain geographical location information in other places in this explosion place certain limit, be used for the on-site geographical location information of explosion is verified.In this case, design this verification content and just can limit actual explosion place and obtain distance between the place of explosion positional information, ensure better the social safty of explosion.
(6) identity code of all detonators in the verification networking judges whether conform to the legal detonator identity code of authorization device 200 interior preservations.This just can guarantee the identity legitimacy of detonator product.
Above-mentioned initiation system information verification process just can realize the verification of the aspects such as legitimacy in legitimacy, the legitimacy of blasting time to priming device, the operating personnel's of detonating legitimacy, detonator product identification legitimacy or explosion place.These several respects are all verified, just can be realized time, the place to bursting work, effective control of personnel, more be conducive to social safety.
A kind of preferred version as detonating authorization method for managing and monitoring of the present invention, in the above-mentioned detonating authorization method for managing and monitoring, in priming device detonates the process of preparing, also by the detection of detonator password further being judged the legitimacy of detonator product, concrete grammar can carry out according to the following steps: priming device 300 can be carried out detonator password request process, waits for receiving the legal detonator password that authorization device 200 sends; Authorization device 200 is carried out detonator password authorization process, sends legal detonator password to priming device 300; After priming device 300 receives legal detonator password, carry out detonator password detection procedure; The detonator password is qualified after testing, then priming device 300 preparation of proceeding to detonate, and finish detonate prepare after, carry out the process of detonating and finish and detonate.
Adopt above-mentioned preferred version, the authorization device mandate supervision flow that authorization device is carried out can carry out according to following steps, as shown in Figure 7:
Steps A 1, whether control circuit 204 monitoring receives the initiation system information that priming device 300 sends: if receive, execution in step A2 then; Otherwise, continue monitoring and receive;
Steps A 2 is carried out initiation system information verification process, judges whether above-mentioned initiation system information is qualified, and then realizes the judgement to this separate explosion legitimacy;
Steps A 3, control circuit 204 judge whether initiation system information is all qualified through verifying: if all qualified, then send the qualified signal of information verification, then execution in step A4 to priming device 300; If initiation system information is defective through verifying, then send the defective signal of information verification, then execution in step A7 to priming device 300;
Steps A 4, control circuit 204 is carried out detonator password authorization process;
Steps A 5 receives the fuzing information that priming device 300 sends, and is saved in the nonvolatile memory 203;
Steps A 6 sends fuzing information to data center 100;
Steps A 7 finishes this authorization device mandate supervision flow.
With authorization device mandate supervision flow shown in Figure 7 accordingly, priming device 300 can be carried out detonating authorization request flow process according to following steps, as shown in Figure 8:
Step B1, control module 301 is obtained the relevant information of this initiation system, i.e. initiation system information, and be sent to authorization device, by authorization device this information is verified;
Step B2, whether control module 301 monitorings receive the information that authorization device 200 returns: if receive, then carry out step B3; Otherwise, continue monitoring and receive;
Step B3, control module 301 judges whether the information that receives is the qualified signal of information verification: if, execution in step B4 then; Otherwise, direct execution in step B12;
Step B4 carries out detonator password request process;
Step B5, control module 301 is judged whether priming device 300 is in and is forbidden the state of detonating: if, direct execution in step B12; Otherwise, execution in step B6;
Step B6 carries out detonator password detection procedure;
Step B7, control module 301 judges whether to exist password to detect wrong detonator: if existence, then execution in step B9; Otherwise, execution in step B8;
Step B8, priming device 300 preparation of detonating, control module 301 judges whether priming device 300 enters the state of detonating that allows: if, execution in step B10 then; Otherwise, direct execution in step B12;
Step B9, priming device 300 enter and forbid the state of detonating, then execution in step B12;
Step B10, priming device 300 is carried out the process of detonating, and finishes and detonates;
Step B11, priming device 300 gathers fuzing information, and is sent to the authorization device preservation;
Step B12 finishes this detonating authorization request flow process.
Above-mentioned steps B4 detonator password request process can be carried out according to the following steps, as shown in Figure 9:
Step C1, priming device is sent to authorization device with the identity code of all detonators in the blasting circuit, and the request authorization device carries out the detonator password authorization;
Step C2, whether priming device monitoring receives the response message that authorization device returns: if receive, execution in step C3 then; Otherwise, continue monitoring and receive;
Step C3, priming device is judged the response message that authorization device returns: if the detonator password reads successfully sign, then read and preserve authorization device to the legal detonator password of its mandate, then execution in step C4; If detonator password read error sign, then priming device enters and forbids the state of detonating, then execution in step C4;
Step C4 finishes this detonator password request process.
With the described flow process of Fig. 9 accordingly, authorization device 200 is carried out detonator password authorization process according to following steps, finishes the mandate to legal detonator password, as shown in figure 10: at first, authorization device 200 receives the detonator identity code that priming devices 300 send.Then, authorization device 200 calls legal detonator identity code its internal non-volatile memory 203 interior preservations, that authorize through data center 100, and compare with the detonator identity code that priming device 300 sends: if the identity code of certain detonator that sends belongs to the identity code of legal detonator, judge that then this detonator is legal detonator, authorization device 200 is set to the detonator password with this detonator and reads successfully sign, and the legal detonator password corresponding with the identity code of this detonator is sent to priming device 300; And if the identity code of certain detonator that sends does not belong to the identity code of legal detonator, judge that then this detonator is illegal detonator, authorization device 200 is set to detonator password read error sign with this detonator, and the random data that produces can be sent to priming device 300.So far, authorization device 200 is finished detonator password authorization process.
Priming device 300 is carried out detonator password request process, and authorization device 200 is carried out detonator password authorization process, the two realization request and mandate to legal detonator password that cooperatively interact.Priming device can be disposable sends the identity code of all detonators to authorization device, also can repeatedly send the identity code of a certain number of detonator to authorization device in batches, also can send the detonator identity code to authorization device one by one.Similarly, authorization device also can be sent to priming device with the legal detonator password of the correspondence through being judged to be legal detonator once or repeatedly in batches.
Priming device 300 is saved to these passwords in the inner buffer of control module 301 after receiving the legal detonator password that authorization device 200 sends, and corresponding one by one with identity code.Priming device 300 can continue all detonators in the networking are carried out the preparations of detonating such as networking detection, defer time setting, charging, and can be according to flow performing detonator password detection procedure as shown in figure 11, priming device sends the instruction that includes legal detonator password one by one to each electric detonator in the blasting circuit, by the detection of electric detonator realization to the detonator password.Specific as follows:
After certain electric detonator receives this instruction, at first whether the identity code in the decision instruction and this detonator is consistent, if consistent, whether the legal detonator password that then continues in the decision instruction is consistent with the password of this detonator: through comparison, if the detonator password is qualified, be that legal detonator password in the password and instruction of this detonator conforms to, then this detonator returns response message to priming device; Otherwise this detonator does not return any information, and priming device then is added to password with the information of this detonator and detects in the wrong detonator information list, and can detect wrong detonator information to operating personnel's display password.After the password of this detonator finished detection, priming device continued that next detonator is carried out the detonator password and detects.
Above-mentioned instruction for detection of the detonator password can be taken as charging instruction, writes the single instructions relevant with blasting cap initiation such as defer time instruction or prefiring instruction.Priming device 300 can according to preseting, when the detonator in the networking being charged, writing the operation of defer time or prefiring, detect the detonator password.If it is defective that the detonator password detects, then this detonator can't normally detonate, and this has just been avoided the illegal use of detonator effectively, has further guaranteed the safety in utilization of detonator.