CN112033242A - Onsite mobile terminal detonation system and control method - Google Patents
Onsite mobile terminal detonation system and control method Download PDFInfo
- Publication number
- CN112033242A CN112033242A CN202010819478.2A CN202010819478A CN112033242A CN 112033242 A CN112033242 A CN 112033242A CN 202010819478 A CN202010819478 A CN 202010819478A CN 112033242 A CN112033242 A CN 112033242A
- Authority
- CN
- China
- Prior art keywords
- detonation
- detection data
- request
- mobile intelligent
- intelligent device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005474 detonation Methods 0.000 title claims abstract description 62
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000000977 initiatory effect Effects 0.000 claims abstract description 23
- 239000003999 initiator Substances 0.000 claims abstract description 21
- 238000004891 communication Methods 0.000 claims abstract description 8
- 238000012795 verification Methods 0.000 claims abstract description 3
- 238000001514 detection method Methods 0.000 claims description 30
- 239000000428 dust Substances 0.000 claims description 5
- 238000005422 blasting Methods 0.000 abstract description 8
- 239000002360 explosive Substances 0.000 description 10
- 230000008569 process Effects 0.000 description 6
- 238000004880 explosion Methods 0.000 description 4
- 239000004575 stone Substances 0.000 description 4
- 238000013475 authorization Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000006872 improvement Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F42—AMMUNITION; BLASTING
- F42D—BLASTING
- F42D1/00—Blasting methods or apparatus, e.g. loading or tamping
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F42—AMMUNITION; BLASTING
- F42D—BLASTING
- F42D1/00—Blasting methods or apparatus, e.g. loading or tamping
- F42D1/04—Arrangements for ignition
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to the field of blasting operation, in particular to a field mobile end detonation system and a control method, wherein the field mobile end detonation system comprises: the initiator is used for initiating a detonation request; the management center comprises a communication module, an output module and an input module; the communication module is used for receiving the detonation request; the checking party is used for confirming the detonation request and the field condition parameters through the output module; the nuclear verification party inputs a detonation instruction through the input equipment; the mobile intelligent device is used for receiving the detonation instruction; and the detonator is used for receiving the detonation signal sent by the mobile intelligent device.
Description
Technical Field
The invention relates to the field of blasting operation, in particular to a field mobile end detonation system and a control method.
Background
Blasting is a technique that utilizes the effects of compression, loosening, destruction, throwing and killing of explosives in air, water, earth and stone media or objects due to explosion to achieve the expected purpose. When the explosive package or explosive charge explodes in earth and stone medium or structure, the earth and stone medium or structure generates the phenomena of compression, deformation, damage, loosening and throwing, and the explosive package or explosive charge is mainly used for earth and stone engineering, the demolition of metal buildings and structures and the like. The range of the study included: the properties and the using method of the explosive and the fireset, the explosive action of the charging (explosive package) in various media, the contact blasting and the non-contact blasting of the charging on the target, and the organization and the implementation of various blasting operations.
The safety of blasting work is of great concern due to its particularity, and in addition, in actual blasting work, some elasticity may be required in time according to actual conditions.
Disclosure of Invention
The invention aims to provide a field mobile end detonation system and a control method thereof, which have strong risk resistance and higher degree of freedom.
The embodiment of the invention is realized by the following steps:
a mobile-in-place end detonation system, comprising:
the initiator is used for initiating a detonation request;
the management center comprises a communication module, an output module and an input module;
the communication module is used for receiving the detonation request;
the checking party is used for confirming the detonation request and the field condition parameters through the output module;
the nuclear verification party inputs a detonation instruction through the input equipment;
the mobile intelligent device is used for receiving the detonation instruction;
and the detonator is used for receiving the detonation signal sent by the mobile intelligent device.
In one embodiment of the invention:
and the management center is connected with the initiator and the mobile intelligent equipment through a wireless network.
In one embodiment of the invention:
the detonator resolving the switching value comprises:
and when the detonation instruction does not meet the preset condition, the mobile intelligent device is disconnected from the detonator.
In one embodiment of the invention:
and the initiator initiates the detonation request through the mobile intelligent device.
In one embodiment of the invention:
the field condition parameters comprise at least one of gas detection data, dust detection data, safety position detection, energy charging detection data, voltage detection data and short circuit detection data.
A method of initiating a mobile-in-place terminal, comprising:
initiating a detonation request by an initiator;
a verifier receives a detonation request;
the verifying party verifies the detonation request and the field condition parameters and inputs a detonation instruction;
the mobile intelligent device receives the detonation instruction;
and the detonator receives the detonation signal sent by the mobile intelligent device.
The technical scheme of the invention at least has the following beneficial effects:
the solution provided in some embodiments of the present application has at least the following advantages: the initiator and the verifier operate separately, namely the site is separated from the rear end, so that the operability and the risk resistance of operation are ensured; the mobile intelligent equipment is utilized to carry out detonation control, and after authorization is obtained, detonation opportunity can be determined by self, and the device has strong freedom degree in time and space.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is a schematic illustration of a mobile-end-in-place initiation system according to some embodiments of the present application;
FIG. 2 is a schematic flow chart diagram of a method of initiating a mobile-in-place terminal according to some embodiments of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Examples
Fig. 1 is a schematic diagram of a field mobile end initiation system 100 including an initiator 110, a management center 120, a verifier 130, a mobile smart device 140, and a detonator 150 according to some embodiments of the present application. FIG. 2 is a schematic flow chart diagram of a method of initiating a mobile-in-place terminal according to some embodiments of the present application.
Referring to fig. 1 and fig. 2 together, in this embodiment, one or more steps of the process 200 may be performed by the system 100 in fig. 1, and include:
In actual explosion engineering, the site and the back end are usually required to be matched with each other, and the back end is generally responsible for judging whether the explosion can be carried out or not due to high safety and perfect site data, and the site is more visual, so that the site usually initiates a request first and then carries out explosion after the back end audits. In this embodiment, the initiator 110 may initiate a detonation request after the parties are ready.
At step 220, the verifier 130 receives the initiation request. Step 220 may be performed by the management center 120.
The central management core 120 includes the communication module for receiving the initiation request, and in some embodiments, at least one of a cable network (e.g., RS232, RS485), a wired network (e.g., LAN, WAN), a telecommunication network (e.g., Wifi), and a mobile network (e.g., 4G, 5G).
Alternatively, in some embodiments, the detonation request may be communicated by a trusted wireless cloud server, typically based on security considerations.
In step 230, the verifying party 130 verifies the initiation request and the field condition parameters, and inputs an initiation instruction. Step 230 may be performed by the management center 120.
The management center 120 also includes an output module and an input module. The output module is used for verifying the detonation request and the field condition parameters by the verifying party 130, and specifically, the output module may be a display. After the verifier 130 confirms the initiation request and the site condition parameters, initiation can be performed when it is determined that the initiation conditions are met, and at this time, an initiation command is input by using an input module, and generally, for safety, the initiator 110 cannot obtain the initiation command and has no condition to input in the site.
In some embodiments, the field condition parameters include, based on requirements associated with the explosive operation: at least one of gas detection data, dust detection data, safety position detection, impulse energy detection data, voltage detection data and short circuit detection data. Specifically, in this embodiment, the field condition parameters include gas detection data, dust detection data, safety position detection, impulse detection data, voltage detection data, and short circuit detection data, and the obtaining manner of each parameter is conventional in the art and is not described in detail again.
In step 240, the mobile smart device 140 receives the detonation instruction. Step 240 may be performed by the mobile smart device 130.
In some embodiments, the mobile smart device 140 may be a cell phone, a tablet, or a dedicated mobile device, among others.
In some embodiments, the management center 120 is connected to the initiator 110 and the mobile smart device 140 through a wireless network, and the wireless connection ensures freedom of location, and when the wireless network is provided by a trusted wireless cloud server, security can be further ensured.
In some embodiments, the detonation instruction may be sent in an encrypted form, so as to avoid potential safety hazards caused by channel monitoring or information leakage. In some embodiments, symmetric Encryption, such as the aes (advanced Encryption standard) Encryption algorithm, may be employed.
In step 250, the detonator receives the detonation signal sent by the mobile smart device 140. Step 250 may be performed by detonator 150.
The detonator 150 and the mobile smart device 140 can be connected in a trusted manner, and the time for detonation can be determined by the mobile smart device 140 after obtaining the authorization for detonation.
Optionally, a near field connection may be used between the detonator 150 and the mobile smart device 140, which may reduce the possibility of most network attacks by operating in both the near field connection and the network connection of the mobile smart device. The near field connection may comprise a 2.4G connection, NFC (near field communication) or bluetooth connection, etc.
When both the field and the back end agree that detonation operations are deemed to be possible, the detonator 150 detonates the explosive, and in some embodiments, the process 200 may be repeated after completing a detonation, depending on engineering requirements, to achieve the next detonation.
In some embodiments, the initiator 110 initiates the detonation request through the mobile smart device 140. That is, the initiator 110 may determine the timing of initiation after initiating the initiation request by using the mobile smart device 140, thereby providing higher adaptability.
In some embodiments, after step 240, when the mobile smart device 140 detects that the detonation instruction does not meet the preset condition, the mobile smart device 140 disconnects from the detonator 150.
Disconnection from the detonator 150, and failure to detonate even if properly signaled or otherwise, avoids security risks to the greatest extent and, in some embodiments, can be networked directly to alarm upon disconnection, as desired.
The solution provided in some embodiments of the present application has at least the following advantages: the initiator and the verifier operate separately, namely the site is separated from the rear end, so that the operability and the risk resistance of operation are ensured; the mobile intelligent equipment is utilized to carry out detonation control, and after authorization is obtained, detonation opportunity can be determined by self, and the device has strong freedom degree in time and space.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
It is to be noted that different embodiments may produce different advantages, and in different embodiments, any one or combination of the above advantages may be produced, or any other advantages may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements and adaptations to the present description may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
Claims (10)
1. A mobile-in-place end detonation system, comprising:
the initiator is used for initiating a detonation request;
the management center comprises a communication module, an output module and an input module;
the communication module is used for receiving the detonation request;
the checking party is used for confirming the detonation request and the field condition parameters through the output module;
the nuclear verification party inputs a detonation instruction through the input equipment;
the mobile intelligent device is used for receiving the detonation instruction;
and the detonator is used for receiving the detonation signal sent by the mobile intelligent device.
2. The system of claim 1, wherein
And the management center is connected with the initiator and the mobile intelligent equipment through a wireless network.
3. The system of claim 2, wherein:
and when the detonation instruction does not meet the preset condition, the mobile intelligent device is disconnected from the detonator.
4. The system of claim 1, wherein,
and the initiator initiates the detonation request through the mobile intelligent device.
5. The system of claim 1, wherein the field condition parameters comprise:
at least one of gas detection data, dust detection data, safety position detection, impulse energy detection data, voltage detection data and short circuit detection data.
6. A method of initiating a mobile-in-place terminal, comprising:
initiating a detonation request by an initiator;
a verifier receives a detonation request;
the verifying party verifies the detonation request and the field condition parameters and inputs a detonation instruction;
the mobile intelligent device receives the detonation instruction;
and the detonator receives the detonation signal sent by the mobile intelligent device.
7. The method of claim 6, wherein:
and the management center is connected with the initiator and the mobile intelligent equipment through a wireless network.
8. The method of claim 6, wherein:
and when the detonation instruction does not meet the preset condition, the mobile intelligent device is disconnected from the detonator.
9. The method of claim 6, wherein:
and the initiator initiates the detonation request through the mobile intelligent device.
10. The method of claim 6, wherein the field condition parameters comprise:
at least one of gas detection data, dust detection data, safety position detection, impulse energy detection data, voltage detection data and short circuit detection data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010819478.2A CN112033242A (en) | 2020-08-14 | 2020-08-14 | Onsite mobile terminal detonation system and control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010819478.2A CN112033242A (en) | 2020-08-14 | 2020-08-14 | Onsite mobile terminal detonation system and control method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112033242A true CN112033242A (en) | 2020-12-04 |
Family
ID=73577523
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010819478.2A Pending CN112033242A (en) | 2020-08-14 | 2020-08-14 | Onsite mobile terminal detonation system and control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112033242A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102607339A (en) * | 2011-08-05 | 2012-07-25 | 薛世忠 | Intelligent detonator and intelligent detonating method for explosives |
CN102944140A (en) * | 2012-11-15 | 2013-02-27 | 湖南长信畅中科技股份有限公司 | Detonation control method of digital detonator |
CN207164561U (en) * | 2017-09-05 | 2018-03-30 | 北京龙德时代技术服务有限公司 | Explosion self-locking system based on cloud management and control |
CN108759601A (en) * | 2018-06-19 | 2018-11-06 | 京工博创(北京)科技有限公司 | A kind of blasting method for realizing ore-rock separation |
CN108827095A (en) * | 2018-06-19 | 2018-11-16 | 京工博创(北京)科技有限公司 | A kind of control system of wireless initiator |
CN109099807A (en) * | 2018-08-23 | 2018-12-28 | 北方爆破科技有限公司 | A kind of digital electric detonator initiation system |
CN109579647A (en) * | 2018-11-21 | 2019-04-05 | 毛龙飞 | Digital primer detonation monitoring and managing method based on cloud control |
CN109631697A (en) * | 2018-11-02 | 2019-04-16 | 北京伊拜科技有限责任公司 | A kind of blasting cap initiation supervision server, terminal, system and method |
CN110823029A (en) * | 2019-09-10 | 2020-02-21 | 贵州全安密灵科技有限公司 | Separated detonation control system and detonation control method |
-
2020
- 2020-08-14 CN CN202010819478.2A patent/CN112033242A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102607339A (en) * | 2011-08-05 | 2012-07-25 | 薛世忠 | Intelligent detonator and intelligent detonating method for explosives |
CN102944140A (en) * | 2012-11-15 | 2013-02-27 | 湖南长信畅中科技股份有限公司 | Detonation control method of digital detonator |
CN207164561U (en) * | 2017-09-05 | 2018-03-30 | 北京龙德时代技术服务有限公司 | Explosion self-locking system based on cloud management and control |
CN108759601A (en) * | 2018-06-19 | 2018-11-06 | 京工博创(北京)科技有限公司 | A kind of blasting method for realizing ore-rock separation |
CN108827095A (en) * | 2018-06-19 | 2018-11-16 | 京工博创(北京)科技有限公司 | A kind of control system of wireless initiator |
CN109099807A (en) * | 2018-08-23 | 2018-12-28 | 北方爆破科技有限公司 | A kind of digital electric detonator initiation system |
CN109631697A (en) * | 2018-11-02 | 2019-04-16 | 北京伊拜科技有限责任公司 | A kind of blasting cap initiation supervision server, terminal, system and method |
CN109579647A (en) * | 2018-11-21 | 2019-04-05 | 毛龙飞 | Digital primer detonation monitoring and managing method based on cloud control |
CN110823029A (en) * | 2019-09-10 | 2020-02-21 | 贵州全安密灵科技有限公司 | Separated detonation control system and detonation control method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101666600B (en) | Novel digital electronic detonator initiator and control method thereof | |
CN108253855B (en) | Electronic detonator detonation control device with control function and control method | |
CN201527238U (en) | Novel digital electronic detonator initiator | |
CN101586933B (en) | Electronic detonator monitoring and managing system | |
CN109583243B (en) | Data safety protection system based on instruction | |
CN110175067B (en) | Mobile application three-dimensional defense method and system | |
CN101527729A (en) | Reliable IKE message negotiation method, device and system thereof | |
CN102147219B (en) | Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system | |
CN104506500A (en) | GOOSE message authentication method based on transformer substation | |
CN114111486B (en) | Electronic detonator initiation device and working method thereof | |
CN110098939A (en) | Message authentication method and device | |
CN109556473B (en) | Industrial detonator initiator, terminal, system and method | |
CN104484596A (en) | Method and terminal for creating password in multi-operation system | |
CN105827405A (en) | Remotely-controlled safety lock device and remote control method thereof | |
CN105050061A (en) | Method and device for sending messages on the basis of user voiceprint information | |
CN105975818A (en) | Method and device for obtaining super user permission | |
CN108827095B (en) | Control system of wireless detonator | |
CN103024736A (en) | Communication connecting method and device | |
CN207197376U (en) | Digital electric detonator end control device | |
CN112033242A (en) | Onsite mobile terminal detonation system and control method | |
CN114279281A (en) | Detonation control method of wireless detonator detonation network | |
CN213631833U (en) | On-site remote detonation system | |
CN109099807A (en) | A kind of digital electric detonator initiation system | |
CN113654421A (en) | Linked mobile end detonation system and control method | |
CN103441989A (en) | Authentication and information processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201204 |
|
RJ01 | Rejection of invention patent application after publication |