CN102564248A - Encryption method for electronic detonators - Google Patents

Encryption method for electronic detonators Download PDF

Info

Publication number
CN102564248A
CN102564248A CN201010618762XA CN201010618762A CN102564248A CN 102564248 A CN102564248 A CN 102564248A CN 201010618762X A CN201010618762X A CN 201010618762XA CN 201010618762 A CN201010618762 A CN 201010618762A CN 102564248 A CN102564248 A CN 102564248A
Authority
CN
China
Prior art keywords
electric detonator
password
identity
coding
detonator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201010618762XA
Other languages
Chinese (zh)
Other versions
CN102564248B (en
Inventor
占必文
彭文林
银庆宇
聂煜
陈辉峻
莫元玲
孙筑
蒋智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUIZHOU JINGCHENGYU TECHNOLOGY CO LTD
Original Assignee
GUIZHOU JINGCHENGYU TECHNOLOGY CO LTD
Guizhou Jiulian Industrial Explosive Materials Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUIZHOU JINGCHENGYU TECHNOLOGY CO LTD, Guizhou Jiulian Industrial Explosive Materials Development Co Ltd filed Critical GUIZHOU JINGCHENGYU TECHNOLOGY CO LTD
Priority to CN201010618762.XA priority Critical patent/CN102564248B/en
Publication of CN102564248A publication Critical patent/CN102564248A/en
Application granted granted Critical
Publication of CN102564248B publication Critical patent/CN102564248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses an encryption method for electronic detonators. A password storage register and an identity (ID) code register are reserved on a chip in an electronic detonator; as the identity code register of the electronic detonator is set or an identity code is modified, an electronic detonator password writer is utilized to generate and write a group of random numbers as a detonating password into the password storage register, and stores the data into a password data center; the password data center sends the detonating password corresponding to the identity code passing verification, and thereby the electronic detonator passing verification can wait to receive the detonating instruction sent by an igniter and then explode. The encryption method adopts built-in random numbers as the detonating password of the electronic detonator, and the detonating password is encrypted and stored by the machine. The mode greatly reduces the possible leakage of the electronic detonator, thus guaranteeing the security of the electronic detonator in use, and moreover, detonation data can be collected as well, which is favorable for the supervision of the usage of the electronic detonator.

Description

The encryption method of electric detonator
Technical field
The present invention relates to the encryption method of a kind of control method of blasting cap initiation, particularly a kind of electric detonator.
Background technology
At present; In existing electric detonator use; The coupling initiator can detect the electric detonator address information of institute's line, grasps the status information of each electric detonator on the line, the timing sign on of detonating that initiator is sent make an appointment through man-machine interaction; Unified trigger after each electric detonator is received this instruction on the line detonates after the preset defer time of arrival.
Along with the development of electronic technology, information technology, above-mentioned electric detonator product is preset, and the timing instruction that begins to detonate is prone to illegally cracked by the offender; Simultaneously, be that the control chip of unified preset instructions is a core because of electric detonator adopts, the preset instructions content all possibly take place and divulge a secret in design process and production process.Thus; If changeless preset data is impacted easily the terrorist incident of social safety, national security as the password that detonates; And link is many because divulge a secret, and is difficult for tracing, and can not realize the electric detonator product that flows out in offender's hand is carried out crash handling.
Summary of the invention
Technical problem to be solved by this invention is: a kind of encryption method of electric detonator is provided, and its password that detonates is difficult for being cracked, and can effectively reduce the link of divulging a secret, to overcome the deficiency of prior art.
The present invention is achieved in that the encryption method of electric detonator; On the electric detonator inside chip, reserve password storage register and identity ID code registers; When detonator plant produced electric detonator, need set the identity ID code registers of electric detonator.Simultaneously, utilize electric detonator password write device to produce one group of random number and write in the password storage register, make the identity ID coding of electric detonator and the password that detonates form relation one to one, and these data are stored into the code data center as the password that detonates; When the blasting engineering scene needs to use electric detonator; The detonator that needs explosion is read its identity ID coding with equipment; And this identity ID coding is uploaded to the code data center test; The corresponding password that detonates of identity ID coding that the code data center will obtain through check sends, and the password that detonates that will receive again sends to electric detonator on line and carries out verification by its inside chip, can wait for through the electric detonator of verification and detonating after receiving the fuze that initiator sends.
The random number length that electric detonator password write device writes in the password storage register is identical with the length of password storage register.
Electric detonator password write device is the device of a similar existing electronic detonator initiator; Two holding wires of its output can provide power supply and carry out bidirectional serial communication to electric detonator, can revise one through preset serial command and not set the identity ID coding and the password that detonates.For guaranteeing that identity ID coding writes instruction or password and writes the situation that modification that instruction possibly occur in the chip production process illegally cracks use, identity ID coding of this chip and password storage register all should be established once and set.
After the electric detonator that needs explosion installed, read the identity ID coding of the electric detonator that needs explosion with equipment, and detect its connection situation whether with met in practice.And the random number that electric detonator password write device produces is not presented on the human-computer interaction module of its this machine; All passwords of being beamed back by the cipher control center all are not presented on the human-computer interaction module of priming device.Apply for that to the cipher control center process of verification password will be undertaken by the priming device follow procedure, need not execute quick-fried personnel and carry out the complex manual operation.
Electric detonator sends to the code data center with fuzing information and puts on record after detonating and finishing.
The identity ID coding of electric detonator comprises the physical address and the delay time of electric detonator.
Owing to adopted technique scheme; Compared with prior art; The present invention adopts the detonate password of built-in random number as electric detonator; The internal control chip designer of the generation of this password that detonates and electric detonator is irrelevant, and irrelevant with the people who writes password, the password value of each electric detonator and all the other electric detonators are irrelevant.The link of divulging a secret that such mode is possible with electric detonator reduces greatly, has guaranteed the security that electric detonator uses, and can also gather up quick-fried data, helps the use of electric detonator is supervised.Method of the present invention is simple, implements easily, and the low cost product of utilizing this method to produce, the device that is adopted is applied widely, and result of use is good.
Description of drawings
Accompanying drawing 1 is a logic diagram of the present invention;
Accompanying drawing 2 is a structural representation of the present invention.
The specific embodiment:
Embodiments of the invention: the encryption method of electric detonator; On the electric detonator inside chip, reserve password storage register and identity ID code registers; When the identity ID code registers of electric detonator is set; Utilizing electric detonator password write device to produce one group of random number writes in the password storage register as the password that detonates; The random number length that electric detonator password write device writes in the password storage register is identical with the length of password storage register; Make the identity ID coding of electric detonator and the password that detonates form relation one to one, and these data are stored into the code data center, and the random number that electric detonator password write device produces is not presented on the human-computer interaction module; The electric detonator that needs explosion is read its identity ID coding with special-purpose priming device; And detect its connection situation whether with met in practice; Again the identity ID of detected electric detonator coding being uploaded to the code data center tests; The code data center will be sent through the corresponding password that detonates of identity ID coding of check; The password that detonates that special-purpose priming device will be received again is input in the corresponding electric detonator and carries out verification, waits for through the electric detonator of verification and detonating after receiving the fuze that initiator sends; Electric detonator sends to the code data center with fuzing information and puts on record after detonating and finishing.
The information conveying flow of the encryption method of electric detonator is as shown in Figure 2; Comprise the electric detonator inside chip 1 of having preset the identity ID coding and the password that detonates; Electric detonator inside chip 1 is connected with fetch equipment 2 (fetch equipment 2 can adopt initiator); Fetch equipment 2 is through wireless network and code data center 3 (also can adopt modes such as cable network or information carrier to be connected, information carrier can adopt instruments such as IC-card, USB flash disk or portable hard drive).
Electric detonator inside chip 1 is installed in the electric detonator 4; And carry out parallelly connected with two holding wires of initiator 2 (promptly being the fetch equipment 2 of the embodiment of the invention) output through the external stitch of electric detonator inside chip 1; And realization exchanges data; Through initiator 2 information of electric detonator being sent to code data center 3 again tests; Code data center 3 will send it back initiator 2 through the password that detonates of electric detonator of check, and initiator 2 password that will detonate sends to electric detonator inside chip 1.
The generation of the password that detonates of above-mentioned electric detonator is carried out according to the following steps:
The first step, when the circuit of design electric detonator inside chip 1, program, reserving cipher storage register " password_word ", its length advises being 20Bit to be advisable greater than 8Bit; Password storage register and identity ID code registers all need adopt power down to preserve the design of data, and only can set once.
Second step; When setting or revising the identity ID coding of an electric detonator inside chip 1; By electric detonator password write device length is write in " password_word " with the identical random number of password register " password_word " length, with the password that detonates as this detonator.Identity ID coding with this electric detonator inside chip 1 forms related table " ID_password " one to one with the random number that has just write simultaneously.Generate the random number that the electric detonator password write device that adopts adopts the generation of modern procedures establishment technique because of the password that detonates in this process; And this random number is not shown in (being similar devices such as display screen) on this equipment human-computer interaction module, and the equipment operator can not know the password value of setting.
The detonate transmission of password of above-mentioned electric detonator is carried out according to the following steps:
The first step, production firm is delivered to code data center 3 with related table " ID_password " through wired or wireless network or information carrier (like IC-card, USB flash disk etc.) and stores (code data center 3 is large servers that the unit by the national authentication qualification sets up).
Second goes on foot, and possesses the electric detonator product management pin department of the password that detonates, and comes into the market by the supply channel of stipulating, in user's hand.The supplier need not to know the password that detonates in this process.
In the 3rd step, according to the subsidiary identify label thing of electric detonator or utilize private identity ID equipment to read the detonator identity ID that collection needs explosion, form form " boom_ID " before user's explosion.
The 4th step; The user utilizes wired or wireless network or information carrier (like IC-card, USB flash disk etc.) to be reported to code data center 3 with " boom_ID ", and whether code data center 3 will provide in " boom_ID " form according to national relevant laws and regulations decision relates to the password that detonates.
The above-mentioned electric detonator flow process of detonating is carried out according to the following steps:
The first step is pressed the electric detonator operational procedure and is connected the input of initiator 2 signals, outlet correct.
In second step, initiator 2 output electric detonators are used power supply energy, 1 initialization of electric detonator inside chip, and permission explosion mark position is invalid.
In the 3rd step, electric detonator inside chip 1 and initiator 2 interactive communications are uploaded identity ID coding.
The 4th step; Whether check these data to network application or read message carrier (like IC-card, USB flash disk etc.) identical with password register " password_word " content of this electric detonator inside chip 1; According to the password that detonates of each electric detonator on the detonator identity ID encoded radio read line on the line, and send on the electric detonator inside chip 1 through the time break output line.
The 5th step; After electric detonator inside chip 1 receives the password that detonates corresponding with the physical address of electric detonator; Whether electric detonator inside chip 1 is checked these data identical with the middle content of password register " password_word "; The identical permission explosion flag bit of then putting is for effectively, but electric detonator 4 did not begin to get into timing and detonated this moment.Through reading device the electric detonator identity ID of line coding is detected once more and can see whether the quick-fried sign of permission is in available state.
The 6th step; The cryptographic core of detonating is waited for the preset beginning fuze that receives the unification that initiators send to effective electric detonator 4, and whether check these data effective, and effectively then whether inspection permission explosion flag bit is effective; If both are trigger effectively then all; Time-delay finishes to open electric detonator point of amorce power-on switch detonates, if not delay detonator then detonates at once.But if electric detonator 4 does not receive that the detonate password consistent with this detonator is that its inner newspaper of being permitted is masked as when invalid on this moment a certain line, electric detonator inside chip 1 will not respond fuze at this moment.
The 7th step, send fuze after, the identity ID of 2 pairs of electric detonators that successfully detonate of initiator coding identifies, the operator should be in time with this feedback information to the code data center.After these data were received at code data center 3, the identity ID of the 3 pairs of quick-fried electric detonators in code data center coding carries out password to be annotated and disappears, and write down the parameters such as time, operator of explosion simultaneously, for future reference.

Claims (6)

1. the encryption method of an electric detonator; It is characterized in that: on the electric detonator inside chip, reserve password storage register and identity ID code registers; When the identity ID code registers of electric detonator being set or revising identity ID coding; Utilizing electric detonator password write device to produce one group of random number writes in the password storage register as the password that detonates; Make the identity ID coding of electric detonator and the password that detonates form relation one to one, and these data are stored into the code data center; The detonator that needs explosion is read its identity ID coding with equipment; And this identity ID coding is uploaded to the code data center test; The code data center will be sent through the corresponding password that detonates of identity ID coding of check; The password that detonates that to receive again is input in the corresponding electric detonator and carries out verification, can wait for through the electric detonator of verification and detonating after receiving the fuze that initiator sends.
2. the encryption method of electric detonator according to claim 1, it is characterized in that: the random number length that electric detonator password write device writes in the password storage register is identical with the length of password storage register.
3. the encryption method of electric detonator according to claim 1 is characterized in that: the random number that electric detonator password write device produces is not presented on the human-computer interaction module.
4. the encryption method of electric detonator according to claim 1 is characterized in that: after will needing the detonator of explosion to install, read the identity ID coding of the electric detonator that needs explosion with equipment, and detect its connection situation whether with met in practice.
5. the encryption method of electric detonator according to claim 1 is characterized in that: electric detonator sends to the code data center with fuzing information and puts on record after detonating and finishing.
6. the encryption method of electric detonator according to claim 1 is characterized in that: the identity ID coding of electric detonator comprises the physical address and the delay time of electric detonator.
CN201010618762.XA 2010-12-31 2010-12-31 Encryption method for electronic detonators Active CN102564248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010618762.XA CN102564248B (en) 2010-12-31 2010-12-31 Encryption method for electronic detonators

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010618762.XA CN102564248B (en) 2010-12-31 2010-12-31 Encryption method for electronic detonators

Publications (2)

Publication Number Publication Date
CN102564248A true CN102564248A (en) 2012-07-11
CN102564248B CN102564248B (en) 2014-03-12

Family

ID=46410336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010618762.XA Active CN102564248B (en) 2010-12-31 2010-12-31 Encryption method for electronic detonators

Country Status (1)

Country Link
CN (1) CN102564248B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016197711A1 (en) * 2015-06-09 2016-12-15 中兴通讯股份有限公司 Method and apparatus for configuring register
CN106643350B (en) * 2016-11-28 2017-12-22 娄文忠 The electric detonator system and its control method of a kind of two-way authentication
CN108955437A (en) * 2018-09-11 2018-12-07 江苏众芯邦软件科技有限公司 A kind of electric detonator detonation system and method
CN111666597A (en) * 2020-05-13 2020-09-15 上海微符尔半导体有限公司 On-chip storage method and device for electronic detonator chip
CN112325714A (en) * 2020-11-05 2021-02-05 南京雷芯聚力电子科技有限公司 Three-code-in-one system and method for electronic detonator
CN112595188A (en) * 2020-12-29 2021-04-02 四川省洪雅青衣江元明粉有限公司 Detonation control method for digital electronic detonator system
CN113014463A (en) * 2021-02-25 2021-06-22 上海赞芯电子科技有限公司 Communication method for electronic fuse
CN113218260A (en) * 2021-03-05 2021-08-06 北京煋邦数码科技有限公司 Curing time-delay electronic detonator control method and device and storage medium
CN113654421A (en) * 2021-08-03 2021-11-16 六盘水华安爆破工程有限公司 Linked mobile end detonation system and control method
CN114646242A (en) * 2022-03-28 2022-06-21 上海芯飏科技有限公司 High-reliability storage system, method, medium and device for electronic detonator chip

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1299110A (en) * 1999-12-03 2001-06-13 陆征军 Method for recognizing identity cards including IC card
CN1391082A (en) * 2002-03-08 2003-01-15 重庆大学 Network monitor method and device for easily exploding articles (detonator)
CN101465735A (en) * 2008-12-19 2009-06-24 北京大学 Network user identification verification method, server and client terminal
CN101488858A (en) * 2008-02-13 2009-07-22 刘海云 Random ciphering method which needs to be deciphered by exhaust algorithm
CN101644552A (en) * 2009-09-08 2010-02-10 北京维深数码科技有限公司 Novel digital electronic detonator and safe tracing and controlling method
CN101656608A (en) * 2008-08-21 2010-02-24 北京亿企通信息技术有限公司 Method and system for single login of Web end of instant messaging device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1299110A (en) * 1999-12-03 2001-06-13 陆征军 Method for recognizing identity cards including IC card
CN1391082A (en) * 2002-03-08 2003-01-15 重庆大学 Network monitor method and device for easily exploding articles (detonator)
CN101488858A (en) * 2008-02-13 2009-07-22 刘海云 Random ciphering method which needs to be deciphered by exhaust algorithm
CN101656608A (en) * 2008-08-21 2010-02-24 北京亿企通信息技术有限公司 Method and system for single login of Web end of instant messaging device
CN101465735A (en) * 2008-12-19 2009-06-24 北京大学 Network user identification verification method, server and client terminal
CN101644552A (en) * 2009-09-08 2010-02-10 北京维深数码科技有限公司 Novel digital electronic detonator and safe tracing and controlling method

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016197711A1 (en) * 2015-06-09 2016-12-15 中兴通讯股份有限公司 Method and apparatus for configuring register
CN106643350B (en) * 2016-11-28 2017-12-22 娄文忠 The electric detonator system and its control method of a kind of two-way authentication
CN108955437A (en) * 2018-09-11 2018-12-07 江苏众芯邦软件科技有限公司 A kind of electric detonator detonation system and method
CN111666597B (en) * 2020-05-13 2021-05-18 上海微符尔半导体有限公司 On-chip storage method and device for electronic detonator chip
CN111666597A (en) * 2020-05-13 2020-09-15 上海微符尔半导体有限公司 On-chip storage method and device for electronic detonator chip
CN112325714A (en) * 2020-11-05 2021-02-05 南京雷芯聚力电子科技有限公司 Three-code-in-one system and method for electronic detonator
CN112325714B (en) * 2020-11-05 2022-11-22 南京雷芯聚力电子科技有限公司 Three-code-in-one system and method for electronic detonator
CN112595188A (en) * 2020-12-29 2021-04-02 四川省洪雅青衣江元明粉有限公司 Detonation control method for digital electronic detonator system
CN113014463A (en) * 2021-02-25 2021-06-22 上海赞芯电子科技有限公司 Communication method for electronic fuse
CN113218260A (en) * 2021-03-05 2021-08-06 北京煋邦数码科技有限公司 Curing time-delay electronic detonator control method and device and storage medium
CN113218260B (en) * 2021-03-05 2024-01-19 北京煋邦数码科技有限公司 Method and device for controlling electronic detonator with curing delay and storage medium
CN113654421A (en) * 2021-08-03 2021-11-16 六盘水华安爆破工程有限公司 Linked mobile end detonation system and control method
CN114646242A (en) * 2022-03-28 2022-06-21 上海芯飏科技有限公司 High-reliability storage system, method, medium and device for electronic detonator chip

Also Published As

Publication number Publication date
CN102564248B (en) 2014-03-12

Similar Documents

Publication Publication Date Title
CN102564248B (en) Encryption method for electronic detonators
CN101666600B (en) Novel digital electronic detonator initiator and control method thereof
CN109696097A (en) Digital electric detonator chip and control method based on dual-wire bus
CN201527238U (en) Novel digital electronic detonator initiator
CN101666599B (en) Novel digital electronic detonator supervisory system and supervisory method thereof
CN104296608A (en) Electronic detonator initiation system and method
CN102147219B (en) Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system
CN201561710U (en) Digital electronic detonator explosion system
CN109764779A (en) Digital electric detonator initiation system and method based on dual-wire bus
CN101114161A (en) Safe type intelligent electric detonator control system and control method thereof
CN101666598A (en) Digital electronic detonator blasting system and control method thereof
CN104785503A (en) Self-destruction micro system for self-destruction of nonvolatile memory chip and self-destruction method of self-destruction micro system
CN109556473B (en) Industrial detonator initiator, terminal, system and method
CN104867885A (en) Self-destruct nonvolatile memory chip and preparation method thereof
CN102121809A (en) Electronic detonator explosion network control device and control flow
CN103743295A (en) Control method for realizing networking detonation of electronic detonator with single headset
CN108847930A (en) A kind of data transmission method, device and fire-fighting system
CN101666596A (en) Novel digital electronic detonator and control method thereof
CN105066802A (en) Remote control initiation system
CN201764914U (en) Digital electronic detonator exploder with GPS locating function
CN110243240A (en) A kind of electronic detonator initiator by Beidou and UID code constrained and time
CN103198247A (en) Computer safety protection method and computer safety protection system
CN201514165U (en) Novel digital electronic detonator
CN204154195U (en) A kind of electric detonator detonation system
CN202188798U (en) Safe electronic exploder detonating system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 550000 Xintian Park, high tech Industrial Development Zone, Guiyang City, Guizhou Province

Co-patentee after: GUIZHOU JINGCHENGYU TECHNOLOGY Co.,Ltd.

Patentee after: Poly United Chemical Holding Group Co., Ltd

Address before: 5-6, building 213, 550002 North Baoshan Road, Guizhou, Guiyang

Co-patentee before: GUIZHOU JINGCHENGYU TECHNOLOGY Co.,Ltd.

Patentee before: GUIZHOU JIULIAN INDUSTRIAL EXPLOSIVE MATERIALS DEVELOPMENT Co.,Ltd.