CN102147219A - Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system - Google Patents

Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system Download PDF

Info

Publication number
CN102147219A
CN102147219A CN201010110640XA CN201010110640A CN102147219A CN 102147219 A CN102147219 A CN 102147219A CN 201010110640X A CN201010110640X A CN 201010110640XA CN 201010110640 A CN201010110640 A CN 201010110640A CN 102147219 A CN102147219 A CN 102147219A
Authority
CN
China
Prior art keywords
authorization
information
detonation
detonator
detonating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201010110640XA
Other languages
Chinese (zh)
Other versions
CN102147219B (en
Inventor
颜景龙
张宪玉
李风国
刘星
翟伯平
白清顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nantong Weitian Electronic Technology Co ltd
Original Assignee
BEIJING BANGIUNION TECHNOLOGY DEVELOPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BANGIUNION TECHNOLOGY DEVELOPMENT Co Ltd filed Critical BEIJING BANGIUNION TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CN 201010110640 priority Critical patent/CN102147219B/en
Publication of CN102147219A publication Critical patent/CN102147219A/en
Application granted granted Critical
Publication of CN102147219B publication Critical patent/CN102147219B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention provides an electronic detonator supervision system and a detonating authorization monitoring management method of the electronic detonator supervision system. The system comprises a data center, an authorization device and a detonating device, wherein the authorization device comprises a control circuit, a nonvolatile memory, a communication interface circuit and a power conversion circuit. The monitoring management method comprises the following steps: the authorization device receives and stores the detonating authorization information sent by the data center and checks the detonating system information sent by the detonating device according to the information, if the detonating system information is qualified, the information check qualification signal is sent to the detonating device. The detonating device receives the check qualification signal and judges the detonating to be legal, then actuates the detonating procedure and completes detonating and collects the detonating information to the authorization device; and the authorization device stores and sends to the data center. Through the technical scheme, the monitoring for detonating is realized by the data center when the network transmission is obstructed, and the requirement to the detonating environment is reduced in the monitoring authorization process.

Description

Electronic detonator supervision system and detonation authorization monitoring management method thereof
Technical Field
The invention relates to monitoring and management of civil explosive material products, in particular to a design of an electronic detonator supervision system and a method for monitoring and managing the use process of an electronic detonator by using the system.
Background
The detonator is a detonating element which outputs detonation energy under the excitation of a small ignition impulse energy, and is an excitation source for the explosion action of other explosive substances such as explosives and the like. Therefore, the monitoring and management of the information flow direction of the industrial detonator is always the most important in the monitoring and management work of the civil explosive device products.
At present, in the detonator production process, China adopts a coding marking technology of mechanical indentation or laser engraving, then converts detonator coding information through a bar code technology, collects and records the coding information into a computer management system, establishes a corresponding computer management system at an explosive circulation, use and supervision department, and establishes a corresponding forced execution management flow. When in sale and circulation, the detonator coded information is bound with an explosion-related unit or an explosion-related person through an IC card, and a new message about detonator circulation is generated while the goods are circulated, so that the whole process of production, circulation and use of each detonator is under the supervision of a computer of a management department.
The management method for detonator coding realizes the monitoring and management of detonator production and circulation links, but cannot prevent the detonator from being illegally used. Firstly, because the traditional electric detonator is powered on and then detonated, the monitoring management department cannot monitor the detonation process of the detonator. Secondly, the detonator is broken into fragments after explosion, the 'code' does not exist any more, and the source of the detonator is difficult to trace by monitoring and managing departments. Thirdly, the information input in each circulation link has strong dependence on people, so that the management link has the possibility of information error or loss caused by human factors. In addition, the code printing is carried out in the detonator production process, so that the production process of the detonator is increased, and the physical code printing mode can also pose a potential threat to the safety of detonator production.
In the 80 s of the 20 th century, developed countries and regions such as japan, australia, and europe began to study electronic detonator technology. Based on two-way communication between a blasting information monitoring management data center and an electronic detonator initiation device, patent application document 200910000065.5 discloses a system capable of monitoring and managing an electronic detonator initiation network, which realizes monitoring of the validity of the use process of an electronic detonator by monitoring and managing information such as the identity validity of a detonator product, the validity of an initiation device, the validity of initiation operators, the validity of initiation positions, the validity of initiation time and the like, and finally realizes control and management of the initiation process of the electronic detonator by authorization control of the initiation device through the data center.
In the monitoring management system, the data center directly carries out remote monitoring management on the detonation process, the legality of the detonation process is monitored, and a party requiring the data center to obtain the detonation device can execute corresponding operation. However, the solution has the following defect that the communication between the initiation device and the data center depends on a wired network or a wireless network, so that when the blasting is performed in an environment with poor communication conditions or unsmooth network transmission, the initiation device and the data center cannot normally communicate, which may cause the system to fail to normally complete the request and authorization for initiation, thereby causing the possibility that the legal blasting cannot be normally performed.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides an electronic detonator supervision system and a detonation authorization monitoring and management method based on the system. The technical scheme of the invention realizes the information check of the detonation system, the authorization of the detonation and the collection and report of the detonation information when the network transmission is not smooth, so that the normal operation of legal blasting is not influenced by the network transmission condition, and the requirement of the monitoring and authorization process on the blasting environment is reduced.
The electronic detonator supervision system comprises a blasting information monitoring management data center, an authorization device and an electronic detonator initiation device, wherein the data center is in two-way communication with the authorization device, and the authorization device is in two-way communication with the initiation device. The authorization device comprises a control circuit, a nonvolatile memory, a communication interface circuit and a power conversion circuit. The power conversion circuit is connected to the modules and respectively supplies power to the modules; the other end of the power supply conversion circuit is connected to a power supply outside the authorization device and receives power supply from the power supply; one end of the other two ends of the control circuit is connected to the communication interface circuit, and the other end of the control circuit is connected to the nonvolatile memory; and the other end of the communication interface circuit is a communication end which is communicated to the outside of the authorization device and is used for data interaction with a data center or the initiation device.
The technical scheme is adopted to design the authorization device, hardware forming conditions are provided for realizing the bidirectional communication between the authorization device and the data center or the initiation device, and therefore a technical basis is provided for realizing the initiation authorization monitoring and management method.
The authorization device in the invention can also adopt another technical scheme, which comprises the following specific steps: the authorization device includes a control circuit, a non-volatile memory, a communication interface circuit, and a power conversion circuit. The communication interface circuit comprises a first communication interface, a second communication interface and a communication interface switching circuit. The power supply conversion circuit is connected to the control circuit, the nonvolatile memory, the first communication interface and the second communication interface and supplies power to the modules; the other end of the power supply conversion circuit is connected to a power supply outside the authorization device and receives power supply from the power supply; the control circuit is also connected with the first communication interface and the second communication interface respectively, and the other end of the control circuit is connected with the nonvolatile memory; one end of the communication interface switching circuit is connected with the other end of the first communication interface, and the other end of the communication interface switching circuit is connected with the other end of the second communication interface; the other two ends of the communication interface switching circuit are respectively led to the outside of the authorization device to respectively form a control end and a communication end of the authorization device.
In the technical scheme, the switching of the first communication interface and the second communication interface is completed by controlling the communication interface switching circuit, so that the switching of different communication forms is completed. Therefore, no matter whether the data center and the detonating device adopt the same communication form to communicate with the authorization device, the authorization device in the technical scheme can be directly applied to realize data interaction, so that the authorization device in the technical scheme has better universality.
The electronic detonator supervision system adopts the following detonation authorization monitoring management method to realize supervision on blasting:
(1) the authorization device receives blasting authorization information sent by the data center and stores the blasting authorization information into a nonvolatile memory inside the authorization device;
(2) the detonation device acquires information of a detonation system and sends the information to the authorization device;
(3) after receiving the information of the detonation system, the authorization device executes a detonation system information checking process, compares the received detonation system information according to the detonation authorization information, and sends an information checking qualified signal to the detonation device if the detonation system information is qualified through comparison;
(4) after receiving the information checking qualified signal, the detonating device carries out detonating preparation; after the detonation preparation is completed, the detonation device executes a detonation process to complete detonation, collects detonation information and sends the detonation information to the authorization device;
(5) the authorization device receives the detonation information and stores the detonation information into the nonvolatile memory;
(6) and the data center self-authorization device acquires detonation information to complete the detonation authorization monitoring and management method.
In the method for monitoring and managing the detonation authorization, the data center firstly authorizes the authorization device for the legal information of the current detonation, and only the authorization device authorized legally by the data center has the capability of monitoring the current detonation, so that the information of the detonation system can be checked according to the request of the detonation device, the authorization of the detonation device is realized, and the detonation device finally completes the detonation. The centralized control and management of the initiation device are technically realized, and the operation validity of the initiation device on the electronic detonator is also ensured, so that the blasting validity is further ensured. In addition, the authorization device collects detonation information after detonation is completed and sends the detonation information to the data center, so that completeness of information collected by the data center is guaranteed, and the data center can conveniently check and trace the detonation.
In the detonation authorization monitoring and management method, in the process of preparing detonation by the detonation device, the detonation device can execute a detonator password request process and wait for receiving a legal detonator password sent by the authorization device; meanwhile, the authorization device executes the detonator password authorization process and sends a legal detonator password to the initiation device. After the detonating device receives the legal detonator password, the detonator password detection process is executed; and if the password of the detonator is qualified through detection, the initiation device continues to carry out initiation preparation, and after the initiation preparation is finished, the initiation process is executed to finish initiation.
The blasting authorization information sent by the data center to the authorization device in the detonation authorization monitoring and management method comprises one or more of the following contents: identity coding information of a legal detonating device, geographical position information of a legal blasting area, time information of legal blasting, identity authorization information of a legal operator, a legal detonator identity code, a legal detonator password and a blasting permission delay time limit.
The information of the detonation system sent by the detonation device to the authorization device in the detonation authorization monitoring and management method comprises one or more items of starting information, blasting position information and blasting network information. The starting-up information comprises one or more of the identity code of the detonating device, the time information of the detonating device during starting up and the identity authorization information input by the operator of the detonating device. The blasting position information comprises one or more items of geographical position information of the location where the blasting is located and time information when the geographical position information is collected. The blasting network information can comprise the identity codes of all electronic detonators in the blasting network at the time, and can also comprise the total number of the electronic detonators in the blasting network at the time.
The authorization device checks the information of the detonation system sent by the detonation device according to the detonation authorization information sent by the data center, and can judge the legitimacy of the current detonation from the aspects of the legitimacy of the detonation device, the legitimacy of the detonation position, the legitimacy of the detonation time, the identity legitimacy of the detonator product, the legitimacy of the detonation operator and the like.
In the method for monitoring and managing the detonation authorization, the validity of the detonator product can be further judged by detecting the password of the detonator in the process of preparing the detonation by the detonation device, and the specific method comprises the following steps:
(1) the initiation device executes a detonator password request process, and the authorization device executes a detonator password authorization process, so that the request and authorization of a legal detonator password are realized: the detonating device sends the identity codes of all detonators in the detonating network to the authorization device; the authorization device compares the received identity code with a legal detonator identity code in the blasting authorization information, and if the identity code is qualified, the legal detonator password corresponding to the received identity code is read and sent to the initiation device to complete a detonator password authorization process; and the detonating device receives the legal detonator password and completes the detonator password request process.
(2) The detonating device executes a detonator password detection process to judge the qualification of the detonator passwords of all detonators in the network: the detonating device sends a command containing a detonator password to a detonator in the detonating network; the detonator compares the detonator password in the command, and if the detonator password is qualified, response information is returned to the detonating device; and the detonating device receives the response information to complete the detonator password detection process. The process can effectively avoid the illegal use of the detonator, and ensures the use safety of the detonator.
Drawings
FIG. 1 is a schematic view of the electronic detonator supervision system according to the present invention;
FIG. 2 is a block diagram showing the construction of a detonating device in the electronic detonator supervisory system;
FIG. 3 is a schematic configuration diagram of a first embodiment of the authorization apparatus according to the present invention;
FIG. 4 is a schematic diagram showing the constitution of a second embodiment of the authorization apparatus according to the present invention;
FIG. 5 is a flowchart illustrating an authorization monitoring method of the authorization apparatus according to the present invention;
FIG. 6 is a schematic diagram of a detonation authorization request flow executed by the detonation device in the present invention;
FIG. 7 is a flowchart illustrating an authorization and supervision method of an authorization apparatus including a password authorization process according to the present invention;
FIG. 8 is a flow diagram illustrating a detonation authorization request flow in accordance with the embodiment of FIG. 7;
FIG. 9 is a schematic flow chart of a detonator password request process of the initiation device in the present invention;
FIG. 10 is a schematic flow chart of a detonator password authorization process of the authorization apparatus of the present invention;
FIG. 11 is a schematic flow chart of a detonator password detection process of the initiation device in the present invention;
fig. 12 is a schematic diagram of a second embodiment of the authorization apparatus according to the present invention.
Detailed Description
The technical solution of the present invention will be further described in detail with reference to the accompanying drawings and the detailed description.
The electronic detonator supervision system comprises a blasting information monitoring management data center 100, an authorization device 200 and an electronic detonator initiation device 300, wherein the data center 100 is in bidirectional communication with the authorization device 200, and the authorization device 200 is in bidirectional communication with the initiation device 300, as shown in fig. 1.
The electronic detonator initiation device 300 may use the solutions disclosed in patent application documents 200810135028.0, 200810135067.0, 200810147438.7, 200820207912.6, 200820207913.0, 200810172102.6 or 200820178278.8. As shown in fig. 2, the detonating device 300 may include a control module 301, a computer communication interface 302, a power management module, a signal modulation transmission module, a signal demodulation reception module, and a power source. Wherein the computer communication interface 302 may be used to enable data interaction between the initiation device 300 and the authorization device 200.
The authorization device 200 in the electronic detonator supervision system of the present invention may comprise a control circuit 204, a non-volatile memory 203, a communication interface circuit 202, and a power conversion circuit 201, as shown in fig. 3. Wherein, the power conversion circuit 201 is connected to the modules and supplies power to the modules; the other end of the power conversion circuit 201 is connected to a power supply outside the authorization apparatus 200, and receives power from the external power supply. The remaining two terminals of the control circuit 204: one end is connected to the communication interface circuit 202, and the other end is connected to the nonvolatile memory 203. The control circuit 204 controls the communication interface circuit 202 to perform data interaction with the external data center 100 or the initiation device 300, on one hand, stores the information on the blasting authorization sent by the data center 100 or the initiation information sent by the initiation device 300 into the nonvolatile memory 203, and on the other hand, sends the information stored in the nonvolatile memory 203 to the data center 100 or the initiation device 300. The other end of the communication interface circuit 202 is a communication end 22, which is connected to the outside of the authorization device 200 to realize data interaction with the data center 100 or the initiation device 300.
If the data center 100 and the initiating device 300 communicate with the authorizing device 200 in different signal forms, the signals output by the data center 100 or the initiating device 300 can be converted into signals recognizable by the authorizing device 200 by using a built-in or external signal conversion interface by using a well-known signal conversion technology to complete the communication. In addition to this, the following modifications can be made to the authorization device: as shown in fig. 4, the authorization device may include a control circuit 204, a non-volatile memory 203, a communication interface circuit 202', and a power conversion circuit 201. The communication interface circuit 202' may further include a communication interface 207, a communication interface 208, and a communication interface switching circuit 206, among others. The specific connection relationship is as follows: the power conversion circuit 201 is connected to the control circuit 204, the nonvolatile memory 203, the communication interface 207, and the communication interface 208, and supplies power to the above modules; the other end of the power conversion circuit 201 is connected to a power supply outside the authorization apparatus 200, and receives power from the power supply. The control circuit 204 is also connected to the communication interface 207 and the communication interface 208, respectively, and the remaining end of the control circuit 204 is connected to the nonvolatile memory 203. One end of the communication interface switching circuit 206 is connected to the other end of the communication interface 207, and the other end is connected to the other end of the communication interface 208, and the other two ends of the communication interface switching circuit 206 are respectively led to the outside of the authorization apparatus 200, and respectively constitute the control end 23 and the communication end 22 of the authorization apparatus 200.
With the embodiment shown in fig. 4, when the authorization apparatus 200 communicates with the outside, the communication interface switching circuit 206 is used to switch the branch connected to the communication interface 207 and the branch connected to the communication interface 208. For example, the system may be designed to: when the authorization apparatus 200 communicates with the data center 100, the control terminal 23 of the authorization apparatus 200 is connected to a low level, and the branch of the communication interface switching circuit 206 connected to the communication interface 208 is turned on; when the authorization device 200 communicates with the initiation device 300, the control terminal 23 of the authorization device 200 is high, and the branch of the communication interface switching circuit 206 connected to the communication interface 207 is turned on. This allows for flexible switching of the authorization apparatus 200 between different communication modes.
If the data center 100 or the initiating device 300 cannot provide the exact high-low level control signal to the control terminal 23 of the authorization device 200 during the communication process, a pull-up circuit or a pull-down circuit may be further designed based on the scheme shown in fig. 4, and the exact high-level or low-level control signal is provided to the communication interface switching circuit 206 through the pull-up or pull-down action. For example, in the embodiment shown in fig. 12, a pull-up circuit 205 is designed to be connected between the control terminal 23 and the output of the power conversion circuit 201, so that when the control terminal 23 is in an indeterminate state, the pull-up circuit 205 will provide a definite high-level signal to the control terminal 23, thereby controlling the gating branch of the communication interface switching circuit 206.
The pull-up circuit or the pull-down circuit in the above embodiments may be designed inside the authorization device or outside the authorization device, and the technical effects are the same.
The detonation authorization monitoring and management method of the electronic detonator supervision system can realize monitoring and management of detonation authorization according to the following steps: the authorization apparatus 200 receives the blasting authorization information transmitted from the data center 100 and stores the information in the nonvolatile memory 203 therein. The detonating device 300 acquires information of a detonating system and sends the information to the authorization device 200; after receiving the information of the detonation system, the authorization device 200 executes a detonation system information checking process, compares the received detonation system information according to the detonation authorization information, and sends an information checking qualified signal to the detonation device 300 if the detonation system information is qualified through the comparison. After receiving the information checking qualified signal, the detonating device 300 performs detonating preparation; after the preparation for detonation is completed, the detonation device 300 executes a detonation process to complete detonation, and collects detonation information and sends the detonation information to the authorization device 200; the authorization device 200 receives the detonation information and stores the detonation information in the nonvolatile memory 203; and the data center self-authorization device acquires the detonation information, so that the detonation authorization monitoring and management method is completed.
In the detonation authorization monitoring and management method, the data center 100 firstly authorizes the legal information of the detonation to the authorization device 200, and only the authorization device authorized legally by the data center has the capability of monitoring the detonation, so that the information of a detonation system can be checked according to the request of the detonation device, the authorization of the detonation device is realized, and the detonation device finally completes detonation. The centralized control and management of the initiation device are technically realized, and the operation validity of the initiation device on the electronic detonator is also ensured, so that the blasting validity is further ensured. In addition, the authorization device 200 also summarizes the detonation information after the detonation is completed, and sends the detonation information to the data center 100, so that the completeness of the information collected by the data center 100 is ensured, and the data center 100 is convenient to check and trace the detonation.
As an aspect of the initiation authorization monitoring and management method of the present invention, an authorization supervision process of an authorization device executed by the authorization device may be performed according to the following steps, as shown in fig. 5:
in the first step, the control circuit 204 monitors whether the initiation system information sent by the initiation device 300 is received: if so, executing the second step; otherwise, continuing to monitor reception;
secondly, executing an information checking process of the detonation system, judging whether the information of the detonation system is qualified or not, and further judging the validity of the current explosion;
thirdly, the control circuit 204 judges whether the detonation system information is qualified after being checked: if the signals are qualified, sending an information checking qualified signal to the detonating device 300, and then executing the fourth step; if the information of the detonating system is not qualified after being checked, sending an information checking unqualified signal to the detonating device 300, and then executing the sixth step;
fourthly, receiving detonation information sent by the detonation device 300 and storing the detonation information in the nonvolatile memory 203;
step five, sending detonation information to the data center 100;
and sixthly, ending the authorization monitoring process of the authorization device.
As another aspect of the initiation authorization monitoring and managing method of the present invention, corresponding to the authorization device authorization supervision process shown in fig. 5, the initiation device 300 executes an initiation authorization request process to request initiation authorization from the authorization device 200 according to the following steps, as shown in fig. 6:
firstly, the control module 301 obtains relevant information of the current detonation system, namely information of the detonation system, and sends the information to the authorization device, and the authorization device checks the information;
step two, the control module 301 monitors whether the information returned by the authorization device 200 is received: if so, performing the third step; otherwise, continuing to monitor reception;
step three, the control module 301 determines whether the received information is an information check qualified signal: if yes, executing the fourth step; otherwise, directly executing the step seven;
step four, the initiation device 300 performs initiation preparation, and the control module 301 judges whether the initiation device 300 enters an initiation allowing state: if yes, executing a fifth step; otherwise, directly executing the step seven;
step five, the detonating device 300 executes a detonating process to complete the detonation;
step six, the detonation device 300 collects detonation information and sends the detonation information to an authorization device for storage;
and step seven, ending the detonation authorization request flow.
The authorization supervision flow of the authorization device shown in fig. 5 and the initiation authorization request flow shown in fig. 6 are matched with each other, so that the monitoring and management of the initiation validity of the electronic detonator are realized. The working process can be described as follows:
(1) the initiation device 300 acquires the initiation system information and sends the initiation system information to the authorization device 200, and the authorization device 200 checks the initiation system information. The detonation system information may include one or more of start-up information, blasting location information, and blasting network information. The initiating device comprises a starting-up information input device, a starting-up information input device and a control device, wherein the starting-up information can comprise one or more of an identity code of the initiating device, date and time information of the initiating device when the initiating device is started up and identity authorization information input by an operator of the initiating device; the blasting position information can comprise one or more of the geographical position information of the place where the blasting is located and date and time information when the geographical position information is collected; the blasting network information can comprise the identity codes of all electronic detonators in the blasting network at the time, and can also comprise the total number of the electronic detonators in the blasting network at the time.
(2) The authorization device 200 executes a process for checking the information of the detonation system, checks the information of the detonation system according to the blasting authorization information sent by the data center 100, and accordingly judges the validity of the detonation. In the authorization apparatus 200, the corresponding contents in the detonation system information and the blasting authorization information are compared one by one. After checking, if the information of the detonating system is qualified, the authorization device 200 sends an information checking qualified signal to the detonating device 300; otherwise, the authorization device 200 sends an information check fail signal to the initiation device 300, and the authorization device ends the authorization supervision process. The detonating device 300 cannot be normally used after receiving the unqualified signal, so that the electronic detonator in the network cannot be detonated, and the illegal blasting is avoided.
(3) The initiation device 300 receives the information verification qualified signal, which indicates that the initiation device 300 is an initiation device authorized to be legally used, so that a series of initiation preparations such as network detection can be carried out on detonators in the initiation network, and after the initiation preparations are completed, the initiation device enters an initiation allowing state, initiation can be further completed, and initiation information is collected to the authorization device.
(5) After receiving the detonation information, the authorization device 200 stores the information and sends the information to the data center 100. The detonation information can comprise information of a detonation network, information of a detonation position, information of time for the detonation device to detonate the electronic detonator, and identity authorization information and image information of an operator who operates the detonation device to complete detonation. Therefore, the data center 100 can collect all relevant information of the blasting, and the data center 100 can check and trace the blasting conveniently.
In the process of checking the information of the detonation system executed by the authorization device 200, the validity of the information of the detonation system is judged according to the blasting authorization information. The blasting authorization information may include one or more of the following: identity coding information of a legal detonating device, geographical position information of a legal blasting area, time information of legal blasting, identity authorization information of a legal operator, a legal detonator identity code, a legal detonator password, a blasting permission delay time limit and the like. The checking content is specifically as follows:
(1) the identity code of the initiation device 300 is checked to determine whether the identity code information matches the identity code information of a legitimate initiation device stored in the authorization device 200. This makes it possible to judge the validity of the use of the detonating device 300 itself, thereby contributing to the assurance of the validity of blasting.
(2) The date and time information of the initiation device 300 when it is powered on is checked to determine whether the date and time information matches the time information of the legitimate blasting stored in the authorization device 200. This ensures the validity of the blasting in time. For example, the blasting regulatory authority may set that blasting is not allowed to be performed on festival days such as national day, spring festival, etc., and if the date and time at the time of starting up is 10 months and 1 day, the result of checking the contents is not qualified, and the blasting device cannot be normally used.
(3) And checking the identity authorization information input by the operator of the detonating device, and judging whether the identity authorization information conforms to the identity authorization information of the legal operator authorized by the data center. The identity authorization information can be verified in a user name password mode in the simplest way. Further, the fingerprint information, iris information, voice information, face information, or the like of the operator can be checked using biometric recognition technology. Therefore, the explosion of an illegal operator by using the detonating device is avoided, and the social safety of the electronic detonator is ensured.
(4) And checking the geographical position information of the blasting place and judging whether the blasting place is in a legal blasting area authorized by the data center. This ensures the legitimacy of the blast site. For example, the blasting monitoring department may set important places such as museums, hospitals, schools, and the like as illegal blasting areas, and if the detonating device is located in these areas, the result of checking the geographical position information is not good, and the detonating device cannot be normally used.
(5) And checking whether the time interval between the acquisition of the blasting position information and the transmission of the blasting system information of the blasting device is within the allowable delay time limit or not, so that the legality of the blasting place can be further ensured. For example, when the location of the blasting site cannot be normally located, the geographical location information may be obtained at other locations within a certain range from the blasting site, and used for checking the geographical location information of the blasting site. In this case, the checking content is designed to limit the distance between the actual blasting site and the site for acquiring the blasting position information, so as to better guarantee the social security of blasting.
(6) The identity codes of the detonators in the network are checked to determine whether they match the legitimate detonator identity codes stored in the authorisation device 200. This ensures the identity legitimacy of the detonator product.
The information checking process of the detonation system can realize the checking of the legitimacy of the detonation device, the legitimacy of the blasting time, the legitimacy of the detonation operator, the identity legitimacy of the detonator product, the legitimacy of the blasting place and the like. The method can realize effective control of time, place and personnel of blasting operation by checking the aspects, and is more beneficial to social safety.
As a preferred scheme of the initiation authorization monitoring and management method of the present invention, in the initiation authorization monitoring and management method, in the process of initiating preparation by the initiation device, the validity of the detonator product is further judged by detecting the detonator password, and the specific method can be performed according to the following steps: the priming device 300 can execute a detonator password request process and wait for receiving a legal detonator password sent by the authorization device 200; the authorization device 200 executes a detonator password authorization process and sends a legal detonator password to the priming device 300; after the detonating device 300 receives the legal detonator password, the detonator password detection process is executed; and if the detonator password is qualified through detection, the initiation device 300 continues to perform initiation preparation, and after the initiation preparation is completed, the initiation process is executed to complete initiation.
With the above preferred scheme, the authorization supervision flow executed by the authorization device can be performed according to the following steps, as shown in fig. 7:
in step a1, the control circuit 204 monitors whether the initiation system information sent by the initiation device 300 is received: if so, go to step A2; otherwise, continuing to monitor reception;
step A2, executing a detonation system information checking process, judging whether the detonation system information is qualified, and further realizing the judgment of the current blasting validity;
step a3, the control circuit 204 determines whether the detonation system information is qualified after being checked: if the signals are qualified, sending an information verification qualified signal to the detonating device 300, and then executing the step A4; if the information of the detonating system is not qualified after being checked, sending an information checking unqualified signal to the detonating device 300, and then executing the step A7;
step a4, the control circuit 204 executes a detonator password authorization process;
step a5, receiving the detonation information sent by the detonation device 300, and storing the detonation information in the nonvolatile memory 203;
step A6, sending detonation information to the data center 100;
and step A7, ending the authorization monitoring flow of the authorization device.
Corresponding to the authorization arrangement authorization supervision flow illustrated in fig. 7, the initiation arrangement 300 may perform an initiation authorization request flow as illustrated in fig. 8, in the following steps:
step B1, the control module 301 obtains relevant information of the current initiation system, that is, initiation system information, and sends the information to the authorization device, and the authorization device checks the information;
in step B2, the control module 301 monitors whether the information returned by the authorization apparatus 200 is received: if so, go to step B3; otherwise, continuing to monitor reception;
in step B3, the control module 301 determines whether the received information is an information check qualified signal: if yes, go to step B4; otherwise, directly executing the step B12;
step B4, executing detonator password request process;
in step B5, the control module 301 determines whether the priming device 300 is in the priming disabled state: if yes, go to step B12 directly; otherwise, go to step B6;
step B6, executing a detonator password detection process;
step B7, the control module 301 determines whether there is a detonator with a wrong password detection: if so, go to step B9; otherwise, go to step B8;
in step B8, the initiation device 300 is prepared for initiation, and the control module 301 determines whether the initiation device 300 enters an initiation-allowed state: if yes, go to step B10; otherwise, directly executing step B12;
step B9, the initiation device 300 enters the initiation inhibiting state, and then step B12 is executed;
step B10, the initiation device 300 executes the initiation process to complete the initiation;
step B11, the detonation device 300 collects detonation information and sends the detonation information to an authorization device for storage;
and step B12, ending the flow of the detonation authorization request.
The detonator password request process of the step B4 can be performed according to the following steps, as shown in fig. 9:
step C1, the detonating device sends the identity codes of all detonators in the detonating network to the authorization device to request the authorization device to carry out detonator password authorization;
step C2, the initiating device monitors whether response information returned by the authorization device is received: if so, go to step C3; otherwise, continuing to monitor reception;
step C3, the initiating device judges the response information returned by the authorization device: if the detonator password is the successful reading mark, reading and storing the legal detonator password authorized by the authorization device, and then executing the step C4; if the detonator password reads the error mark, the detonating device enters a detonation forbidden state, and then the step C4 is executed;
and step C4, ending the detonator password request process.
Corresponding to the flow described in fig. 9, the authorization apparatus 200 executes a detonator password authorization process according to the following steps, and completes authorization of a legal detonator password, as shown in fig. 10: first, the authorization device 200 receives the detonator identification code transmitted from the initiation device 300. Then, the authorization device 200 calls the legal detonator identity code which is stored in the internal nonvolatile memory 203 and authorized by the data center 100, and compares the legal detonator identity code with the detonator identity code sent by the initiation device 300: if the sent identity code of a certain detonator belongs to the identity code of a legal detonator, the detonator is judged to be a legal detonator, the authorization device 200 sets the detonator as a detonator password reading success mark, and sends a legal detonator password corresponding to the identity code of the detonator to the initiation device 300; if the sent identity code of a certain detonator does not belong to the identity code of a legal detonator, the detonator is judged to be an illegal detonator, the authorization device 200 sets the detonator as a detonator password reading error mark, and can send the generated random data to the initiation device 300. Thus, the authorization apparatus 200 completes the detonator password authorization process.
The initiation device 300 executes a detonator password request process, the authorization device 200 executes a detonator password authorization process, and the initiation device and the authorization device are matched with each other to realize the request and authorization of a legal detonator password. The detonating device can send the identity codes of all detonators to the authorization device at one time, can also send the identity codes of a certain number of detonators to the authorization device in batches for multiple times, and can also send the identity codes of the detonators to the authorization device one by one. Similarly, the authorization device may also send the corresponding legal detonator password determined to be legal detonator to the initiation device at one time or in batches for multiple times.
After receiving the legal detonator password sent by the authorization device 200, the initiation device 300 stores the password in the internal cache of the control module 301, and the password corresponds to the identity code one by one. The priming device 300 can continue to perform priming preparation work such as network detection, delay time setting, charging and the like on the detonators in the network, and can execute a detonator password detection process according to the flow shown in fig. 11, and the priming device sends instructions containing legal detonator passwords to each electronic detonator in the priming network one by one, so that the electronic detonator realizes the detection of the detonator passwords. The method comprises the following specific steps:
after receiving the instruction, the electronic detonator firstly judges whether the identity code in the instruction is consistent with the password of the detonator, if so, the electronic detonator continuously judges whether the legal detonator password in the instruction is consistent with the password of the detonator: after comparison, if the detonator password is qualified, namely the password of the detonator is consistent with the legal detonator password in the command, the detonator returns response information to the detonating device; otherwise, the detonator does not return any information, the detonating device adds the information of the detonator into the detonator information list with wrong password detection, and the detonator information with wrong password detection can be displayed to the operator. And after the password of the detonator is detected, the detonating device continues to detect the password of the next detonator.
The command for detecting the detonator password can be a single command related to detonator initiation, such as a charging command, a writing delay time command, or a pre-ignition command. The priming device 300 can detect the detonator password while charging, writing delay time or pre-ignition operation is performed on the detonators in the network according to the preset setting. If the detonator password is not detected qualified, the detonator cannot detonate normally, so that the illegal use of the detonator is effectively avoided, and the use safety of the detonator is further ensured.

Claims (8)

1. An electronic detonator supervision system is characterized in that:
the monitoring system comprises a blasting information monitoring management data center, an authorization device and an electronic detonator initiation device; the data center is in bidirectional communication with the authorization device, which is in bidirectional communication with the initiation device;
wherein the authorization device comprises a control circuit, a nonvolatile memory, a communication interface circuit, and a power conversion circuit,
the power conversion circuit is connected to the modules and supplies power to the modules respectively; the other end of the power supply conversion circuit is connected to a power supply outside the authorization device and receives power supply of the power supply; one end of the other two ends of the control circuit is connected to the communication interface circuit, and the other end of the control circuit is connected to the nonvolatile memory; and the other end of the communication interface circuit is a communication end which is communicated to the outside of the authorization device and performs data interaction with the data center or the initiation device.
2. An electronic detonator supervision system is characterized in that:
the monitoring system comprises a blasting information monitoring management data center, an authorization device and an electronic detonator initiation device; the data center is in bidirectional communication with the authorization device, which is in bidirectional communication with the initiation device;
wherein the authorization device comprises a control circuit, a nonvolatile memory, a communication interface circuit and a power supply conversion circuit, the communication interface circuit comprises a first communication interface, a second communication interface and a communication interface switching circuit,
the power supply conversion circuit is connected to the control circuit, the nonvolatile memory, the first communication interface and the second communication interface and supplies power to the modules; the other end of the power supply conversion circuit is connected to a power supply outside the authorization device and receives power supply of the power supply; the control circuit is also connected with the first communication interface and the second communication interface respectively, and the other end of the control circuit is connected with the nonvolatile memory; one end of the communication interface switching circuit is connected with the other end of the first communication interface, and the other end of the communication interface switching circuit is connected with the other end of the second communication interface; and the other two ends of the communication interface switching circuit are respectively communicated to the outside of the authorization device to respectively form a control end and a communication end of the authorization device.
3. A detonation authorization monitoring and management method based on the electronic detonator supervision system of claim 1 or 2, characterized in that:
the method adopts the following procedures to realize the monitoring and management of the detonation,
the authorization device receives blasting authorization information sent by the data center and stores the blasting authorization information into the nonvolatile memory inside the authorization device;
the detonation device acquires information of a detonation system and sends the information to the authorization device;
after receiving the information of the detonation system, the authorization device executes a detonation system information checking process, compares the received detonation system information according to the detonation authorization information, and sends an information checking qualified signal to the detonation device if the detonation system information is qualified after the comparison;
after receiving the information checking qualified signal, the detonating device carries out detonating preparation; after the detonation preparation is completed, the detonation device executes a detonation process to complete detonation, and collects detonation information and sends the detonation information to the authorization device;
the authorization device receives the detonation information and stores the detonation information into the nonvolatile memory;
and the data center acquires the detonation information from the authorization device to complete the detonation authorization monitoring and management method.
4. The detonation authorization monitoring management method according to claim 3, characterized by:
in the process of carrying out the detonation preparation by the detonation device, the detonation device executes a detonator password request process and waits for receiving a legal detonator password sent by the authorization device; meanwhile, the authorization device executes a detonator password authorization process and sends the legal detonator password to the initiation device;
after the detonating device receives the legal detonator password, a detonator password detection process is executed;
and if the detonator password is detected to be qualified, the initiation device continues to carry out initiation preparation.
5. The detonation authorization monitoring management method according to claim 3 or 4, characterized by:
the blasting authorization information comprises one or more of the following contents:
identity coding information of a legal detonating device, geographical position information of a legal blasting area, time information of legal blasting, identity authorization information of a legal operator, a legal detonator identity code, a legal detonator password and a blasting permission delay time limit.
6. The detonation authorization monitoring management method according to claim 3 or 4, characterized by:
the information of the detonation system comprises one or more items of starting information, blasting position information and blasting network information; wherein,
the starting-up information comprises one or more of the identity code of the detonating device, time information of the detonating device during starting up and identity authorization information input by an operator of the detonating device;
the blasting position information comprises one or more of geographical position information of the location where the blasting is located and time information when the geographical position information is collected;
the blasting network information comprises the total number of the electronic detonators in the blasting network and the identity codes of the electronic detonators in the blasting network.
7. The detonation authorization monitoring management method according to claim 4, characterized by:
the detonating device executes the detonator password request process, and the authorization device executes the detonator password authorization process, so that the request and authorization of the legal detonator password are realized:
the initiating device sending the identity codes of the detonators in the initiating circuit to the authorisation device;
the authorization device compares the received identity code with the identity code of the legal detonator; comparing, if the identity code is qualified, reading the legal detonator password corresponding to the received identity code and sending the legal detonator password to the detonating device; then the detonator password authorization process is completed;
and the detonating device receives the legal detonator password and completes the detonator password request process.
8. The detonation authorization monitoring management method according to claim 4, characterized by:
the detonator password detection process is carried out according to the following method,
the detonating device sends an instruction containing a detonator password to the detonators in the detonating network; the detonator compares the detonator password in the command, and if the detonator password is qualified, response information is returned to the initiation device;
and the detonating device receives the response information to complete the detonator password detection process.
CN 201010110640 2010-02-09 2010-02-09 Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system Active CN102147219B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010110640 CN102147219B (en) 2010-02-09 2010-02-09 Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010110640 CN102147219B (en) 2010-02-09 2010-02-09 Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system

Publications (2)

Publication Number Publication Date
CN102147219A true CN102147219A (en) 2011-08-10
CN102147219B CN102147219B (en) 2013-10-30

Family

ID=44421601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010110640 Active CN102147219B (en) 2010-02-09 2010-02-09 Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system

Country Status (1)

Country Link
CN (1) CN102147219B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102608960A (en) * 2011-10-25 2012-07-25 薛世忠 Explosive information collector and explosive information collection method
CN102608961A (en) * 2011-11-01 2012-07-25 薛世忠 Remote monitoring equipment and method for explosives
CN105592159A (en) * 2015-12-31 2016-05-18 贵州久联民爆器材发展股份有限公司 Method of utilizing GPRS network to realize electronic detonator networked control
CN105868885A (en) * 2016-03-22 2016-08-17 融硅思创(北京)科技有限公司 Working platform for movable explosion site management
CN106468526A (en) * 2016-03-03 2017-03-01 阎跃鹏 A kind of explosive security control apparatus
CN107606997A (en) * 2017-11-01 2018-01-19 黑龙江科技大学 A kind of intelligent interlocking initiation control method
CN109556473A (en) * 2018-11-02 2019-04-02 北京伊拜科技有限责任公司 A kind of industrial detonator initiator, terminal, system and method
CN109631697A (en) * 2018-11-02 2019-04-16 北京伊拜科技有限责任公司 A kind of blasting cap initiation supervision server, terminal, system and method
CN110823029A (en) * 2019-09-10 2020-02-21 贵州全安密灵科技有限公司 Separated detonation control system and detonation control method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU614870B2 (en) * 1988-09-01 1991-09-12 Orica Explosives Technology Pty Ltd A method of controlling a blasting operation
CN101324413B (en) * 2008-07-28 2011-08-10 颜景龙 Detonating device and main control process flow thereof
CN101586933B (en) * 2009-01-06 2013-05-29 北京铱钵隆芯科技有限责任公司 Electronic detonator monitoring and managing system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102608960A (en) * 2011-10-25 2012-07-25 薛世忠 Explosive information collector and explosive information collection method
CN102608961A (en) * 2011-11-01 2012-07-25 薛世忠 Remote monitoring equipment and method for explosives
CN102608961B (en) * 2011-11-01 2015-11-25 薛世忠 Explosive remote monitoring equipment and method for supervising
CN105592159A (en) * 2015-12-31 2016-05-18 贵州久联民爆器材发展股份有限公司 Method of utilizing GPRS network to realize electronic detonator networked control
CN106468526A (en) * 2016-03-03 2017-03-01 阎跃鹏 A kind of explosive security control apparatus
CN106468526B (en) * 2016-03-03 2019-02-01 阎跃鹏 Pass through the location information of GNSS and the safe initiation managing device of specified Region Matching
CN105868885A (en) * 2016-03-22 2016-08-17 融硅思创(北京)科技有限公司 Working platform for movable explosion site management
CN107606997A (en) * 2017-11-01 2018-01-19 黑龙江科技大学 A kind of intelligent interlocking initiation control method
CN109556473A (en) * 2018-11-02 2019-04-02 北京伊拜科技有限责任公司 A kind of industrial detonator initiator, terminal, system and method
CN109631697A (en) * 2018-11-02 2019-04-16 北京伊拜科技有限责任公司 A kind of blasting cap initiation supervision server, terminal, system and method
CN109556473B (en) * 2018-11-02 2021-08-31 北京伊拜科技有限责任公司 Industrial detonator initiator, terminal, system and method
CN110823029A (en) * 2019-09-10 2020-02-21 贵州全安密灵科技有限公司 Separated detonation control system and detonation control method

Also Published As

Publication number Publication date
CN102147219B (en) 2013-10-30

Similar Documents

Publication Publication Date Title
CN102147219B (en) Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system
CN108253855B (en) Electronic detonator detonation control device with control function and control method
CN109764779B (en) Digital electronic detonator detonation system and method based on double-wire bus
CN101666598B (en) Digital electronic detonator blasting system and control method thereof
CN101586933B (en) Electronic detonator monitoring and managing system
US8839720B2 (en) Security enhanced blasting apparatus, and method of blasting
CN110823029A (en) Separated detonation control system and detonation control method
CN101666599B (en) Novel digital electronic detonator supervisory system and supervisory method thereof
CN105547062B (en) Initiation controller of electronic detonator and control method thereof
CN114646243B (en) Digital detonator initiation control method and system for improving safety
CN110243240A (en) A kind of electronic detonator initiator by Beidou and UID code constrained and time
CN202074893U (en) Control device for detonation of electric detonator based on GSM network monitoring
CN109556473B (en) Industrial detonator initiator, terminal, system and method
CN201561710U (en) Digital electronic detonator explosion system
CN106327652A (en) System and method for protecting electronic intelligent door locks and fingerprint locks
CN111340987A (en) Internet of things door lock communication method, device and system and computer storage medium
CN201514165U (en) Novel digital electronic detonator
CN207197376U (en) Digital electric detonator end control device
CN108827095B (en) Control system of wireless detonator
CN109857004A (en) A kind of digital electric detonator register method and its initiation system
CN106446664A (en) U disk, authorization authentication method thereof and data transmission device
CN107369231B (en) Intelligent lock control method and device
CN109664000B (en) Tin soldering system
CN104103106A (en) Access control system and control method thereof
CN201476723U (en) Electronic detonator operation control device based on voice identification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP02 Change in the address of a patent holder

Address after: 100097 Beijing city Haidian District road Jin Yuan era business center A block 11F

Patentee after: Beijing BangiUnion Technology Development Co., Ltd.

Address before: 100085 Beijing city Haidian District East Road No. 1 Yingchuang power block A Room 601

Patentee before: Beijing BangiUnion Technology Development Co., Ltd.

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20170120

Address after: 100097 Beijing city Haidian District landianchang Road business center Jin Yuan era A block 11F

Patentee after: Beijing Ebtech Co., Ltd.

Address before: 100097 Beijing city Haidian District road Jin Yuan era business center A block 11F

Patentee before: Beijing BangiUnion Technology Development Co., Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220127

Address after: 226141 Group 8, Lianyi village, Sijia Town, Haimen District, Nantong City, Jiangsu Province

Patentee after: Nantong Weitian Electronic Technology Co.,Ltd.

Address before: 100097 11F, block a, Jinyuan times business center, lantianchang East Road, Haidian District, Beijing

Patentee before: BEIJING EBTECH TECHNOLOGY CO.,LTD.