Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides an electronic detonator supervision system and a detonation authorization monitoring and management method based on the system. The technical scheme of the invention realizes the information check of the detonation system, the authorization of the detonation and the collection and report of the detonation information when the network transmission is not smooth, so that the normal operation of legal blasting is not influenced by the network transmission condition, and the requirement of the monitoring and authorization process on the blasting environment is reduced.
The electronic detonator supervision system comprises a blasting information monitoring management data center, an authorization device and an electronic detonator initiation device, wherein the data center is in two-way communication with the authorization device, and the authorization device is in two-way communication with the initiation device. The authorization device comprises a control circuit, a nonvolatile memory, a communication interface circuit and a power conversion circuit. The power conversion circuit is connected to the modules and respectively supplies power to the modules; the other end of the power supply conversion circuit is connected to a power supply outside the authorization device and receives power supply from the power supply; one end of the other two ends of the control circuit is connected to the communication interface circuit, and the other end of the control circuit is connected to the nonvolatile memory; and the other end of the communication interface circuit is a communication end which is communicated to the outside of the authorization device and is used for data interaction with a data center or the initiation device.
The technical scheme is adopted to design the authorization device, hardware forming conditions are provided for realizing the bidirectional communication between the authorization device and the data center or the initiation device, and therefore a technical basis is provided for realizing the initiation authorization monitoring and management method.
The authorization device in the invention can also adopt another technical scheme, which comprises the following specific steps: the authorization device includes a control circuit, a non-volatile memory, a communication interface circuit, and a power conversion circuit. The communication interface circuit comprises a first communication interface, a second communication interface and a communication interface switching circuit. The power supply conversion circuit is connected to the control circuit, the nonvolatile memory, the first communication interface and the second communication interface and supplies power to the modules; the other end of the power supply conversion circuit is connected to a power supply outside the authorization device and receives power supply from the power supply; the control circuit is also connected with the first communication interface and the second communication interface respectively, and the other end of the control circuit is connected with the nonvolatile memory; one end of the communication interface switching circuit is connected with the other end of the first communication interface, and the other end of the communication interface switching circuit is connected with the other end of the second communication interface; the other two ends of the communication interface switching circuit are respectively led to the outside of the authorization device to respectively form a control end and a communication end of the authorization device.
In the technical scheme, the switching of the first communication interface and the second communication interface is completed by controlling the communication interface switching circuit, so that the switching of different communication forms is completed. Therefore, no matter whether the data center and the detonating device adopt the same communication form to communicate with the authorization device, the authorization device in the technical scheme can be directly applied to realize data interaction, so that the authorization device in the technical scheme has better universality.
The electronic detonator supervision system adopts the following detonation authorization monitoring management method to realize supervision on blasting:
(1) the authorization device receives blasting authorization information sent by the data center and stores the blasting authorization information into a nonvolatile memory inside the authorization device;
(2) the detonation device acquires information of a detonation system and sends the information to the authorization device;
(3) after receiving the information of the detonation system, the authorization device executes a detonation system information checking process, compares the received detonation system information according to the detonation authorization information, and sends an information checking qualified signal to the detonation device if the detonation system information is qualified through comparison;
(4) after receiving the information checking qualified signal, the detonating device carries out detonating preparation; after the detonation preparation is completed, the detonation device executes a detonation process to complete detonation, collects detonation information and sends the detonation information to the authorization device;
(5) the authorization device receives the detonation information and stores the detonation information into the nonvolatile memory;
(6) and the data center self-authorization device acquires detonation information to complete the detonation authorization monitoring and management method.
In the method for monitoring and managing the detonation authorization, the data center firstly authorizes the authorization device for the legal information of the current detonation, and only the authorization device authorized legally by the data center has the capability of monitoring the current detonation, so that the information of the detonation system can be checked according to the request of the detonation device, the authorization of the detonation device is realized, and the detonation device finally completes the detonation. The centralized control and management of the initiation device are technically realized, and the operation validity of the initiation device on the electronic detonator is also ensured, so that the blasting validity is further ensured. In addition, the authorization device collects detonation information after detonation is completed and sends the detonation information to the data center, so that completeness of information collected by the data center is guaranteed, and the data center can conveniently check and trace the detonation.
In the detonation authorization monitoring and management method, in the process of preparing detonation by the detonation device, the detonation device can execute a detonator password request process and wait for receiving a legal detonator password sent by the authorization device; meanwhile, the authorization device executes the detonator password authorization process and sends a legal detonator password to the initiation device. After the detonating device receives the legal detonator password, the detonator password detection process is executed; and if the password of the detonator is qualified through detection, the initiation device continues to carry out initiation preparation, and after the initiation preparation is finished, the initiation process is executed to finish initiation.
The blasting authorization information sent by the data center to the authorization device in the detonation authorization monitoring and management method comprises one or more of the following contents: identity coding information of a legal detonating device, geographical position information of a legal blasting area, time information of legal blasting, identity authorization information of a legal operator, a legal detonator identity code, a legal detonator password and a blasting permission delay time limit.
The information of the detonation system sent by the detonation device to the authorization device in the detonation authorization monitoring and management method comprises one or more items of starting information, blasting position information and blasting network information. The starting-up information comprises one or more of the identity code of the detonating device, the time information of the detonating device during starting up and the identity authorization information input by the operator of the detonating device. The blasting position information comprises one or more items of geographical position information of the location where the blasting is located and time information when the geographical position information is collected. The blasting network information can comprise the identity codes of all electronic detonators in the blasting network at the time, and can also comprise the total number of the electronic detonators in the blasting network at the time.
The authorization device checks the information of the detonation system sent by the detonation device according to the detonation authorization information sent by the data center, and can judge the legitimacy of the current detonation from the aspects of the legitimacy of the detonation device, the legitimacy of the detonation position, the legitimacy of the detonation time, the identity legitimacy of the detonator product, the legitimacy of the detonation operator and the like.
In the method for monitoring and managing the detonation authorization, the validity of the detonator product can be further judged by detecting the password of the detonator in the process of preparing the detonation by the detonation device, and the specific method comprises the following steps:
(1) the initiation device executes a detonator password request process, and the authorization device executes a detonator password authorization process, so that the request and authorization of a legal detonator password are realized: the detonating device sends the identity codes of all detonators in the detonating network to the authorization device; the authorization device compares the received identity code with a legal detonator identity code in the blasting authorization information, and if the identity code is qualified, the legal detonator password corresponding to the received identity code is read and sent to the initiation device to complete a detonator password authorization process; and the detonating device receives the legal detonator password and completes the detonator password request process.
(2) The detonating device executes a detonator password detection process to judge the qualification of the detonator passwords of all detonators in the network: the detonating device sends a command containing a detonator password to a detonator in the detonating network; the detonator compares the detonator password in the command, and if the detonator password is qualified, response information is returned to the detonating device; and the detonating device receives the response information to complete the detonator password detection process. The process can effectively avoid the illegal use of the detonator, and ensures the use safety of the detonator.
Detailed Description
The technical solution of the present invention will be further described in detail with reference to the accompanying drawings and the detailed description.
The electronic detonator supervision system comprises a blasting information monitoring management data center 100, an authorization device 200 and an electronic detonator initiation device 300, wherein the data center 100 is in bidirectional communication with the authorization device 200, and the authorization device 200 is in bidirectional communication with the initiation device 300, as shown in fig. 1.
The electronic detonator initiation device 300 may use the solutions disclosed in patent application documents 200810135028.0, 200810135067.0, 200810147438.7, 200820207912.6, 200820207913.0, 200810172102.6 or 200820178278.8. As shown in fig. 2, the detonating device 300 may include a control module 301, a computer communication interface 302, a power management module, a signal modulation transmission module, a signal demodulation reception module, and a power source. Wherein the computer communication interface 302 may be used to enable data interaction between the initiation device 300 and the authorization device 200.
The authorization device 200 in the electronic detonator supervision system of the present invention may comprise a control circuit 204, a non-volatile memory 203, a communication interface circuit 202, and a power conversion circuit 201, as shown in fig. 3. Wherein, the power conversion circuit 201 is connected to the modules and supplies power to the modules; the other end of the power conversion circuit 201 is connected to a power supply outside the authorization apparatus 200, and receives power from the external power supply. The remaining two terminals of the control circuit 204: one end is connected to the communication interface circuit 202, and the other end is connected to the nonvolatile memory 203. The control circuit 204 controls the communication interface circuit 202 to perform data interaction with the external data center 100 or the initiation device 300, on one hand, stores the information on the blasting authorization sent by the data center 100 or the initiation information sent by the initiation device 300 into the nonvolatile memory 203, and on the other hand, sends the information stored in the nonvolatile memory 203 to the data center 100 or the initiation device 300. The other end of the communication interface circuit 202 is a communication end 22, which is connected to the outside of the authorization device 200 to realize data interaction with the data center 100 or the initiation device 300.
If the data center 100 and the initiating device 300 communicate with the authorizing device 200 in different signal forms, the signals output by the data center 100 or the initiating device 300 can be converted into signals recognizable by the authorizing device 200 by using a built-in or external signal conversion interface by using a well-known signal conversion technology to complete the communication. In addition to this, the following modifications can be made to the authorization device: as shown in fig. 4, the authorization device may include a control circuit 204, a non-volatile memory 203, a communication interface circuit 202', and a power conversion circuit 201. The communication interface circuit 202' may further include a communication interface 207, a communication interface 208, and a communication interface switching circuit 206, among others. The specific connection relationship is as follows: the power conversion circuit 201 is connected to the control circuit 204, the nonvolatile memory 203, the communication interface 207, and the communication interface 208, and supplies power to the above modules; the other end of the power conversion circuit 201 is connected to a power supply outside the authorization apparatus 200, and receives power from the power supply. The control circuit 204 is also connected to the communication interface 207 and the communication interface 208, respectively, and the remaining end of the control circuit 204 is connected to the nonvolatile memory 203. One end of the communication interface switching circuit 206 is connected to the other end of the communication interface 207, and the other end is connected to the other end of the communication interface 208, and the other two ends of the communication interface switching circuit 206 are respectively led to the outside of the authorization apparatus 200, and respectively constitute the control end 23 and the communication end 22 of the authorization apparatus 200.
With the embodiment shown in fig. 4, when the authorization apparatus 200 communicates with the outside, the communication interface switching circuit 206 is used to switch the branch connected to the communication interface 207 and the branch connected to the communication interface 208. For example, the system may be designed to: when the authorization apparatus 200 communicates with the data center 100, the control terminal 23 of the authorization apparatus 200 is connected to a low level, and the branch of the communication interface switching circuit 206 connected to the communication interface 208 is turned on; when the authorization device 200 communicates with the initiation device 300, the control terminal 23 of the authorization device 200 is high, and the branch of the communication interface switching circuit 206 connected to the communication interface 207 is turned on. This allows for flexible switching of the authorization apparatus 200 between different communication modes.
If the data center 100 or the initiating device 300 cannot provide the exact high-low level control signal to the control terminal 23 of the authorization device 200 during the communication process, a pull-up circuit or a pull-down circuit may be further designed based on the scheme shown in fig. 4, and the exact high-level or low-level control signal is provided to the communication interface switching circuit 206 through the pull-up or pull-down action. For example, in the embodiment shown in fig. 12, a pull-up circuit 205 is designed to be connected between the control terminal 23 and the output of the power conversion circuit 201, so that when the control terminal 23 is in an indeterminate state, the pull-up circuit 205 will provide a definite high-level signal to the control terminal 23, thereby controlling the gating branch of the communication interface switching circuit 206.
The pull-up circuit or the pull-down circuit in the above embodiments may be designed inside the authorization device or outside the authorization device, and the technical effects are the same.
The detonation authorization monitoring and management method of the electronic detonator supervision system can realize monitoring and management of detonation authorization according to the following steps: the authorization apparatus 200 receives the blasting authorization information transmitted from the data center 100 and stores the information in the nonvolatile memory 203 therein. The detonating device 300 acquires information of a detonating system and sends the information to the authorization device 200; after receiving the information of the detonation system, the authorization device 200 executes a detonation system information checking process, compares the received detonation system information according to the detonation authorization information, and sends an information checking qualified signal to the detonation device 300 if the detonation system information is qualified through the comparison. After receiving the information checking qualified signal, the detonating device 300 performs detonating preparation; after the preparation for detonation is completed, the detonation device 300 executes a detonation process to complete detonation, and collects detonation information and sends the detonation information to the authorization device 200; the authorization device 200 receives the detonation information and stores the detonation information in the nonvolatile memory 203; and the data center self-authorization device acquires the detonation information, so that the detonation authorization monitoring and management method is completed.
In the detonation authorization monitoring and management method, the data center 100 firstly authorizes the legal information of the detonation to the authorization device 200, and only the authorization device authorized legally by the data center has the capability of monitoring the detonation, so that the information of a detonation system can be checked according to the request of the detonation device, the authorization of the detonation device is realized, and the detonation device finally completes detonation. The centralized control and management of the initiation device are technically realized, and the operation validity of the initiation device on the electronic detonator is also ensured, so that the blasting validity is further ensured. In addition, the authorization device 200 also summarizes the detonation information after the detonation is completed, and sends the detonation information to the data center 100, so that the completeness of the information collected by the data center 100 is ensured, and the data center 100 is convenient to check and trace the detonation.
As an aspect of the initiation authorization monitoring and management method of the present invention, an authorization supervision process of an authorization device executed by the authorization device may be performed according to the following steps, as shown in fig. 5:
in the first step, the control circuit 204 monitors whether the initiation system information sent by the initiation device 300 is received: if so, executing the second step; otherwise, continuing to monitor reception;
secondly, executing an information checking process of the detonation system, judging whether the information of the detonation system is qualified or not, and further judging the validity of the current explosion;
thirdly, the control circuit 204 judges whether the detonation system information is qualified after being checked: if the signals are qualified, sending an information checking qualified signal to the detonating device 300, and then executing the fourth step; if the information of the detonating system is not qualified after being checked, sending an information checking unqualified signal to the detonating device 300, and then executing the sixth step;
fourthly, receiving detonation information sent by the detonation device 300 and storing the detonation information in the nonvolatile memory 203;
step five, sending detonation information to the data center 100;
and sixthly, ending the authorization monitoring process of the authorization device.
As another aspect of the initiation authorization monitoring and managing method of the present invention, corresponding to the authorization device authorization supervision process shown in fig. 5, the initiation device 300 executes an initiation authorization request process to request initiation authorization from the authorization device 200 according to the following steps, as shown in fig. 6:
firstly, the control module 301 obtains relevant information of the current detonation system, namely information of the detonation system, and sends the information to the authorization device, and the authorization device checks the information;
step two, the control module 301 monitors whether the information returned by the authorization device 200 is received: if so, performing the third step; otherwise, continuing to monitor reception;
step three, the control module 301 determines whether the received information is an information check qualified signal: if yes, executing the fourth step; otherwise, directly executing the step seven;
step four, the initiation device 300 performs initiation preparation, and the control module 301 judges whether the initiation device 300 enters an initiation allowing state: if yes, executing a fifth step; otherwise, directly executing the step seven;
step five, the detonating device 300 executes a detonating process to complete the detonation;
step six, the detonation device 300 collects detonation information and sends the detonation information to an authorization device for storage;
and step seven, ending the detonation authorization request flow.
The authorization supervision flow of the authorization device shown in fig. 5 and the initiation authorization request flow shown in fig. 6 are matched with each other, so that the monitoring and management of the initiation validity of the electronic detonator are realized. The working process can be described as follows:
(1) the initiation device 300 acquires the initiation system information and sends the initiation system information to the authorization device 200, and the authorization device 200 checks the initiation system information. The detonation system information may include one or more of start-up information, blasting location information, and blasting network information. The initiating device comprises a starting-up information input device, a starting-up information input device and a control device, wherein the starting-up information can comprise one or more of an identity code of the initiating device, date and time information of the initiating device when the initiating device is started up and identity authorization information input by an operator of the initiating device; the blasting position information can comprise one or more of the geographical position information of the place where the blasting is located and date and time information when the geographical position information is collected; the blasting network information can comprise the identity codes of all electronic detonators in the blasting network at the time, and can also comprise the total number of the electronic detonators in the blasting network at the time.
(2) The authorization device 200 executes a process for checking the information of the detonation system, checks the information of the detonation system according to the blasting authorization information sent by the data center 100, and accordingly judges the validity of the detonation. In the authorization apparatus 200, the corresponding contents in the detonation system information and the blasting authorization information are compared one by one. After checking, if the information of the detonating system is qualified, the authorization device 200 sends an information checking qualified signal to the detonating device 300; otherwise, the authorization device 200 sends an information check fail signal to the initiation device 300, and the authorization device ends the authorization supervision process. The detonating device 300 cannot be normally used after receiving the unqualified signal, so that the electronic detonator in the network cannot be detonated, and the illegal blasting is avoided.
(3) The initiation device 300 receives the information verification qualified signal, which indicates that the initiation device 300 is an initiation device authorized to be legally used, so that a series of initiation preparations such as network detection can be carried out on detonators in the initiation network, and after the initiation preparations are completed, the initiation device enters an initiation allowing state, initiation can be further completed, and initiation information is collected to the authorization device.
(5) After receiving the detonation information, the authorization device 200 stores the information and sends the information to the data center 100. The detonation information can comprise information of a detonation network, information of a detonation position, information of time for the detonation device to detonate the electronic detonator, and identity authorization information and image information of an operator who operates the detonation device to complete detonation. Therefore, the data center 100 can collect all relevant information of the blasting, and the data center 100 can check and trace the blasting conveniently.
In the process of checking the information of the detonation system executed by the authorization device 200, the validity of the information of the detonation system is judged according to the blasting authorization information. The blasting authorization information may include one or more of the following: identity coding information of a legal detonating device, geographical position information of a legal blasting area, time information of legal blasting, identity authorization information of a legal operator, a legal detonator identity code, a legal detonator password, a blasting permission delay time limit and the like. The checking content is specifically as follows:
(1) the identity code of the initiation device 300 is checked to determine whether the identity code information matches the identity code information of a legitimate initiation device stored in the authorization device 200. This makes it possible to judge the validity of the use of the detonating device 300 itself, thereby contributing to the assurance of the validity of blasting.
(2) The date and time information of the initiation device 300 when it is powered on is checked to determine whether the date and time information matches the time information of the legitimate blasting stored in the authorization device 200. This ensures the validity of the blasting in time. For example, the blasting regulatory authority may set that blasting is not allowed to be performed on festival days such as national day, spring festival, etc., and if the date and time at the time of starting up is 10 months and 1 day, the result of checking the contents is not qualified, and the blasting device cannot be normally used.
(3) And checking the identity authorization information input by the operator of the detonating device, and judging whether the identity authorization information conforms to the identity authorization information of the legal operator authorized by the data center. The identity authorization information can be verified in a user name password mode in the simplest way. Further, the fingerprint information, iris information, voice information, face information, or the like of the operator can be checked using biometric recognition technology. Therefore, the explosion of an illegal operator by using the detonating device is avoided, and the social safety of the electronic detonator is ensured.
(4) And checking the geographical position information of the blasting place and judging whether the blasting place is in a legal blasting area authorized by the data center. This ensures the legitimacy of the blast site. For example, the blasting monitoring department may set important places such as museums, hospitals, schools, and the like as illegal blasting areas, and if the detonating device is located in these areas, the result of checking the geographical position information is not good, and the detonating device cannot be normally used.
(5) And checking whether the time interval between the acquisition of the blasting position information and the transmission of the blasting system information of the blasting device is within the allowable delay time limit or not, so that the legality of the blasting place can be further ensured. For example, when the location of the blasting site cannot be normally located, the geographical location information may be obtained at other locations within a certain range from the blasting site, and used for checking the geographical location information of the blasting site. In this case, the checking content is designed to limit the distance between the actual blasting site and the site for acquiring the blasting position information, so as to better guarantee the social security of blasting.
(6) The identity codes of the detonators in the network are checked to determine whether they match the legitimate detonator identity codes stored in the authorisation device 200. This ensures the identity legitimacy of the detonator product.
The information checking process of the detonation system can realize the checking of the legitimacy of the detonation device, the legitimacy of the blasting time, the legitimacy of the detonation operator, the identity legitimacy of the detonator product, the legitimacy of the blasting place and the like. The method can realize effective control of time, place and personnel of blasting operation by checking the aspects, and is more beneficial to social safety.
As a preferred scheme of the initiation authorization monitoring and management method of the present invention, in the initiation authorization monitoring and management method, in the process of initiating preparation by the initiation device, the validity of the detonator product is further judged by detecting the detonator password, and the specific method can be performed according to the following steps: the priming device 300 can execute a detonator password request process and wait for receiving a legal detonator password sent by the authorization device 200; the authorization device 200 executes a detonator password authorization process and sends a legal detonator password to the priming device 300; after the detonating device 300 receives the legal detonator password, the detonator password detection process is executed; and if the detonator password is qualified through detection, the initiation device 300 continues to perform initiation preparation, and after the initiation preparation is completed, the initiation process is executed to complete initiation.
With the above preferred scheme, the authorization supervision flow executed by the authorization device can be performed according to the following steps, as shown in fig. 7:
in step a1, the control circuit 204 monitors whether the initiation system information sent by the initiation device 300 is received: if so, go to step A2; otherwise, continuing to monitor reception;
step A2, executing a detonation system information checking process, judging whether the detonation system information is qualified, and further realizing the judgment of the current blasting validity;
step a3, the control circuit 204 determines whether the detonation system information is qualified after being checked: if the signals are qualified, sending an information verification qualified signal to the detonating device 300, and then executing the step A4; if the information of the detonating system is not qualified after being checked, sending an information checking unqualified signal to the detonating device 300, and then executing the step A7;
step a4, the control circuit 204 executes a detonator password authorization process;
step a5, receiving the detonation information sent by the detonation device 300, and storing the detonation information in the nonvolatile memory 203;
step A6, sending detonation information to the data center 100;
and step A7, ending the authorization monitoring flow of the authorization device.
Corresponding to the authorization arrangement authorization supervision flow illustrated in fig. 7, the initiation arrangement 300 may perform an initiation authorization request flow as illustrated in fig. 8, in the following steps:
step B1, the control module 301 obtains relevant information of the current initiation system, that is, initiation system information, and sends the information to the authorization device, and the authorization device checks the information;
in step B2, the control module 301 monitors whether the information returned by the authorization apparatus 200 is received: if so, go to step B3; otherwise, continuing to monitor reception;
in step B3, the control module 301 determines whether the received information is an information check qualified signal: if yes, go to step B4; otherwise, directly executing the step B12;
step B4, executing detonator password request process;
in step B5, the control module 301 determines whether the priming device 300 is in the priming disabled state: if yes, go to step B12 directly; otherwise, go to step B6;
step B6, executing a detonator password detection process;
step B7, the control module 301 determines whether there is a detonator with a wrong password detection: if so, go to step B9; otherwise, go to step B8;
in step B8, the initiation device 300 is prepared for initiation, and the control module 301 determines whether the initiation device 300 enters an initiation-allowed state: if yes, go to step B10; otherwise, directly executing step B12;
step B9, the initiation device 300 enters the initiation inhibiting state, and then step B12 is executed;
step B10, the initiation device 300 executes the initiation process to complete the initiation;
step B11, the detonation device 300 collects detonation information and sends the detonation information to an authorization device for storage;
and step B12, ending the flow of the detonation authorization request.
The detonator password request process of the step B4 can be performed according to the following steps, as shown in fig. 9:
step C1, the detonating device sends the identity codes of all detonators in the detonating network to the authorization device to request the authorization device to carry out detonator password authorization;
step C2, the initiating device monitors whether response information returned by the authorization device is received: if so, go to step C3; otherwise, continuing to monitor reception;
step C3, the initiating device judges the response information returned by the authorization device: if the detonator password is the successful reading mark, reading and storing the legal detonator password authorized by the authorization device, and then executing the step C4; if the detonator password reads the error mark, the detonating device enters a detonation forbidden state, and then the step C4 is executed;
and step C4, ending the detonator password request process.
Corresponding to the flow described in fig. 9, the authorization apparatus 200 executes a detonator password authorization process according to the following steps, and completes authorization of a legal detonator password, as shown in fig. 10: first, the authorization device 200 receives the detonator identification code transmitted from the initiation device 300. Then, the authorization device 200 calls the legal detonator identity code which is stored in the internal nonvolatile memory 203 and authorized by the data center 100, and compares the legal detonator identity code with the detonator identity code sent by the initiation device 300: if the sent identity code of a certain detonator belongs to the identity code of a legal detonator, the detonator is judged to be a legal detonator, the authorization device 200 sets the detonator as a detonator password reading success mark, and sends a legal detonator password corresponding to the identity code of the detonator to the initiation device 300; if the sent identity code of a certain detonator does not belong to the identity code of a legal detonator, the detonator is judged to be an illegal detonator, the authorization device 200 sets the detonator as a detonator password reading error mark, and can send the generated random data to the initiation device 300. Thus, the authorization apparatus 200 completes the detonator password authorization process.
The initiation device 300 executes a detonator password request process, the authorization device 200 executes a detonator password authorization process, and the initiation device and the authorization device are matched with each other to realize the request and authorization of a legal detonator password. The detonating device can send the identity codes of all detonators to the authorization device at one time, can also send the identity codes of a certain number of detonators to the authorization device in batches for multiple times, and can also send the identity codes of the detonators to the authorization device one by one. Similarly, the authorization device may also send the corresponding legal detonator password determined to be legal detonator to the initiation device at one time or in batches for multiple times.
After receiving the legal detonator password sent by the authorization device 200, the initiation device 300 stores the password in the internal cache of the control module 301, and the password corresponds to the identity code one by one. The priming device 300 can continue to perform priming preparation work such as network detection, delay time setting, charging and the like on the detonators in the network, and can execute a detonator password detection process according to the flow shown in fig. 11, and the priming device sends instructions containing legal detonator passwords to each electronic detonator in the priming network one by one, so that the electronic detonator realizes the detection of the detonator passwords. The method comprises the following specific steps:
after receiving the instruction, the electronic detonator firstly judges whether the identity code in the instruction is consistent with the password of the detonator, if so, the electronic detonator continuously judges whether the legal detonator password in the instruction is consistent with the password of the detonator: after comparison, if the detonator password is qualified, namely the password of the detonator is consistent with the legal detonator password in the command, the detonator returns response information to the detonating device; otherwise, the detonator does not return any information, the detonating device adds the information of the detonator into the detonator information list with wrong password detection, and the detonator information with wrong password detection can be displayed to the operator. And after the password of the detonator is detected, the detonating device continues to detect the password of the next detonator.
The command for detecting the detonator password can be a single command related to detonator initiation, such as a charging command, a writing delay time command, or a pre-ignition command. The priming device 300 can detect the detonator password while charging, writing delay time or pre-ignition operation is performed on the detonators in the network according to the preset setting. If the detonator password is not detected qualified, the detonator cannot detonate normally, so that the illegal use of the detonator is effectively avoided, and the use safety of the detonator is further ensured.