CN102564248B - Encryption method for electronic detonators - Google Patents

Encryption method for electronic detonators Download PDF

Info

Publication number
CN102564248B
CN102564248B CN201010618762.XA CN201010618762A CN102564248B CN 102564248 B CN102564248 B CN 102564248B CN 201010618762 A CN201010618762 A CN 201010618762A CN 102564248 B CN102564248 B CN 102564248B
Authority
CN
China
Prior art keywords
password
electric detonator
identity
detonator
coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010618762.XA
Other languages
Chinese (zh)
Other versions
CN102564248A (en
Inventor
占必文
彭文林
银庆宇
聂煜
陈辉峻
莫元玲
孙筑
蒋智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUIZHOU JINGCHENGYU TECHNOLOGY CO LTD
Original Assignee
GUIZHOU JINGCHENGYU TECHNOLOGY CO LTD
Guizhou Jiulian Industrial Explosive Materials Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUIZHOU JINGCHENGYU TECHNOLOGY CO LTD, Guizhou Jiulian Industrial Explosive Materials Development Co Ltd filed Critical GUIZHOU JINGCHENGYU TECHNOLOGY CO LTD
Priority to CN201010618762.XA priority Critical patent/CN102564248B/en
Publication of CN102564248A publication Critical patent/CN102564248A/en
Application granted granted Critical
Publication of CN102564248B publication Critical patent/CN102564248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses an encryption method for electronic detonators. A password storage register and an identity (ID) code register are reserved on a chip in an electronic detonator; as the identity code register of the electronic detonator is set or an identity code is modified, an electronic detonator password writer is utilized to generate and write a group of random numbers as a detonating password into the password storage register, and stores the data into a password data center; the password data center sends the detonating password corresponding to the identity code passing verification, and thereby the electronic detonator passing verification can wait to receive the detonating instruction sent by an igniter and then explode. The encryption method adopts built-in random numbers as the detonating password of the electronic detonator, and the detonating password is encrypted and stored by the machine. The mode greatly reduces the possible leakage of the electronic detonator, thus guaranteeing the security of the electronic detonator in use, and moreover, detonation data can be collected as well, which is favorable for the supervision of the usage of the electronic detonator.

Description

The encryption method of electric detonator
Technical field
The present invention relates to the encryption method of a kind of control method of blasting cap initiation, particularly a kind of electric detonator.
Background technology
At present, in existing electric detonator use procedure, coupling initiator can detect the electric detonator address information of institute's line, grasp the state information of each electric detonator on line, the timing sign on of detonating that initiator is sent make an appointment by man-machine interaction, on line, each electric detonator is unified trigger after receiving this instruction, after the default defer time of arrival, detonates.
Along with the development of electronic technology, information technology, above-mentioned electric detonator product is default, and the timing instruction that starts to detonate is easily illegally cracked by offender; Meanwhile, the control chip that is unified preset instructions because of electric detonator employing is core, and design process and production process preset instructions content all may occur and divulge a secret.Thus, if easily impact the terrorist incident of social safety, national security using changeless preset data as the password that detonates, and because divulge a secret, link is many, is difficult for tracing, and the electric detonator product that can not realize flowing out in offender's hand carries out crash handling.
Summary of the invention
Technical problem to be solved by this invention is: a kind of encryption method of electric detonator is provided, and its password that detonates is difficult for being cracked, and can effectively reduce the link of divulging a secret, to overcome the deficiencies in the prior art.
The present invention is achieved in that the encryption method of electric detonator, on electric detonator inside chip, reserve password storage register and identity ID code registers, when detonator plant produced electric detonator, need to set the identity ID code registers of electric detonator.Meanwhile, utilize electric detonator password write device to produce one group of random number and write in password storage register as the password that detonates, make the identity ID coding of electric detonator and the password that detonates form relation one to one, and by these data storings to code data center; When electric detonator need to be used in blasting engineering scene, to need the detonator of explosion to read its identity ID coding with equipment, and this identity ID coding is uploaded to code data center test, code data center sends the password that detonates corresponding to identity ID coding obtaining by check, again the password that detonates of receiving is sent to electric detonator on line and carry out verification by its inside chip, by the electric detonator of verification, can wait for after receiving the fuze that initiator sends and detonating.
The random number length that electric detonator password write device writes in password storage register is identical with the length of password storage register.
Electric detonator password write device is the device of a similar existing electronic detonator initiator, two holding wires of its output can provide power supply and carry out bidirectional serial communication to electric detonator, can revise one do not set identity ID coding and the password that detonates by default serial command.For guaranteeing that identity ID coding writes instruction or password and writes the situation that modification that instruction may occur in chip production process illegally cracks use, the identity ID coding of this chip and password storage register all should be established once and set.
After the electric detonator that needs explosion is installed, with equipment, read the identity ID coding of the electric detonator that needs explosion, and detect its connection and whether conform to actual.And the random number that electric detonator password write device produces is not presented on the human-computer interaction module of its machine; All passwords of being beamed back by cipher control center are not all presented on the human-computer interaction module of priming device.To cipher control center, apply for that the process of verification password will be undertaken by priming device follow procedure, do not need to execute quick-fried personnel and carry out complicated manual operation.
After electronic detonator initiating finishes, fuzing information is sent to code data center and put on record.
The identity ID coding of electric detonator comprises physical address and the delay time of electric detonator.
Owing to having adopted technique scheme, compared with prior art, the present invention adopts built-in random number as the password that detonates of electric detonator, the internal control chip designer of the generation of this password that detonates and electric detonator is irrelevant, irrelevant with the people who writes password, the password value of each electric detonator and all the other electric detonators are irrelevant.Such mode reduces the possible link of divulging a secret of electric detonator greatly, has guaranteed the fail safe that electric detonator is used, and can also gather up quick-fried data, is conducive to the use of electric detonator to be supervised.Method of the present invention is simple, easily implements, and the low cost product of utilizing the method to produce, the device adopting is applied widely, and result of use is good.
Accompanying drawing explanation
Accompanying drawing 1 is logic diagram of the present invention;
Accompanying drawing 2 is structural representation of the present invention.
Embodiment:
Embodiments of the invention: the encryption method of electric detonator, on electric detonator inside chip, reserve password storage register and identity ID code registers, when the identity ID code registers to electric detonator is set, utilizing electric detonator password write device to produce one group of random number writes in password storage register as the password that detonates, the random number length that electric detonator password write device writes in password storage register is identical with the length of password storage register, make the identity ID coding of electric detonator and the password that detonates form relation one to one, and by these data storings to code data center, and the random number that electric detonator password write device produces is not presented on human-computer interaction module, to need the electric detonator of explosion to read its identity ID coding with special-purpose priming device, and detect its connection and whether conform to actual, again the identity ID coding of the electric detonator detecting being uploaded to code data center tests, code data center sends the password that detonates corresponding to identity ID coding by check, special-purpose priming device carries out verification by the Password Input that detonates of receiving again in corresponding electric detonator, by the electric detonator of verification, is waited for after receiving the fuze that initiator sends and being detonated, after electronic detonator initiating finishes, fuzing information is sent to code data center and put on record.
The information conveying flow of the encryption method of electric detonator as shown in Figure 2, comprise the electric detonator inside chip 1 of having preset identity ID coding and the password that detonates, electric detonator inside chip 1 can adopt initiator with fetch equipment 2(fetch equipment 2) be connected, fetch equipment 2 also can adopt the modes such as cable network or information carrier to be connected by wireless network with code data center 3(, and information carrier can adopt the instruments such as IC-card, USB flash disk or portable hard drive).
Electric detonator inside chip 1 is installed in electric detonator 4, and be the fetch equipment 2 of the embodiment of the present invention by the external stitch of electric detonator inside chip 1 with initiator 2() output two holding wires carry out in parallel, and realize exchanges data, by initiator 2, send to code data center 3 to test the information of electric detonator again, code data center 3 sends it back initiator 2 by the password that detonates of electric detonator by check, and initiator 2 password that will detonate sends to electric detonator inside chip 1.
The generation of the password that detonates of above-mentioned electric detonator is carried out according to the following steps:
The first step, when the circuit of design electric detonator inside chip 1, program, reserving cipher storage register " password_word ", its length is advisable to be greater than 8Bit, advises as 20Bit; Password storage register and identity ID code registers all need to adopt the design of power down save data, and only can set once.
Second step, when setting or revising the identity ID coding of an electric detonator inside chip 1, by electric detonator password write device, the length random number identical with password register " password_word " length write in " password_word " to the password that detonates of usining as this detonator.The identity ID coding of this electric detonator inside chip 1 is formed to related table " ID_password " one to one with the random number just having write simultaneously.In this process, because of the password that detonates, generate the random number of the electric detonator password write device employing modern procedures establishment technique generation adopting, and this random number is not shown in (being the similar devices such as display screen) on this equipment human-computer interaction module, equipment operator can not know the password value of setting.
The transmission of above-mentioned electronic detonator initiating password is carried out according to the following steps:
The first step, production firm is delivered to code data center 3 by related table " ID_password " by wired or wireless network or information carrier (as IC-card, USB flash disk etc.) and stores (code data center 3 is large servers that the unit by national authentication qualification sets up).
Second step, possesses the electric detonator product management pin department of the password that detonates, and supply channel in accordance with regulations comes into the market, in user's hand.In this process, supplier is without knowing the password that detonates.
The 3rd step, according to the subsidiary identify label thing of electric detonator or utilize private identity ID equipment to read and collect the detonator identity ID that needs explosion, forms form " boom_ID " before user's explosion.
The 4th step, user utilizes wired or wireless network or information carrier (as IC-card, USB flash disk etc.) to be reported to code data center 3 by " boom_ID ", and whether code data center 3 will determine to provide in " boom_ID " form to relate to the password that detonates according to national relevant laws and regulations.
Above-mentioned electronic detonator initiating flow process is carried out according to the following steps:
The first step, connects correct by electric detonator operational procedure by initiator 2 signal inputs, outlet.
Second step, initiator 2 output electric detonator power supply energies, 1 initialization of electric detonator inside chip, license explosion mark position is invalid.
The 3rd step, electric detonator inside chip 1 and initiator 2 interactive communications, upload identity ID coding.
The 4th step, whether identically with password register " password_word " content of this electric detonator inside chip 1 to network application or read message carrier (as IC-card, USB flash disk etc.), check these data, according to the password that detonates of each electric detonator on detonator identity ID encoded radio read line on line, and send on electric detonator inside chip 1 by time break output line.
The 5th step, electric detonator inside chip 1 receives corresponding the detonating after password of physical address with electric detonator, whether electric detonator inside chip 1 is checked these data identical with content in password register " password_word ", the identical license explosion flag bit of putting is for effectively, but now electric detonator 4 does not start to enter timing and detonates.By reading device, the electric detonator identity ID coding of line is again detected and can see that whether the quick-fried sign of license is in available state.
The 6th step, the cryptographic core of detonating is waited for the default beginning fuze of the unification that reception initiator sends to effective electric detonator 4, whether and it is effective to check these data, effectively check that whether license explosion flag bit is effective, if both are trigger effectively all, time delay finishes to open electric detonator point of amorce power-on switch detonates, if not delay detonator detonates at once.But, if now on a certain line electric detonator 4 do not receive that the detonate password consistent with this detonator is that its inner report of being permitted is masked as when invalid, electric detonator inside chip 1 will not respond fuze now.
The 7th step, sends after fuze, and the identity ID coding of 2 pairs of electric detonators that successfully detonate of initiator identifies, and operator should feed back to code data center by this information in time.Code data center 3 receives after these data, and the identity ID coding of the 3 pairs of quick-fried electric detonators in code data center carries out password to be noted and disappear, and records the parameters such as time, operator of explosion simultaneously, for future reference.

Claims (6)

1. the encryption method of an electric detonator, it is characterized in that: on electric detonator inside chip, reserve password storage register and identity ID code registers, when the identity ID code registers to electric detonator is set, utilizing electric detonator password write device to produce one group of random number writes in password storage register as the password that detonates, make the identity ID coding of electric detonator and the password that detonates form relation one to one, and by these data storings to code data center; To need the detonator of explosion to read its identity ID coding with equipment, and this identity ID coding is uploaded to code data center test, code data center sends the password that detonates corresponding to identity ID coding by check, again the Password Input that detonates of receiving is carried out to verification in corresponding electric detonator, by the electric detonator of verification, can wait for after receiving the fuze that initiator sends and detonating; Identity ID coding and the password storage register of chip all can only be set once.
2. according to the encryption method of the electric detonator described in claim 1, it is characterized in that: the random number length that electric detonator password write device writes in password storage register is identical with the length of password storage register.
3. according to the encryption method of the electric detonator described in claim 1, it is characterized in that: the random number that electric detonator password write device produces is not presented on human-computer interaction module.
4. according to the encryption method of the electric detonator described in claim 1, it is characterized in that: after the detonator that needs explosion is installed, with equipment, read the identity ID coding of the electric detonator that needs explosion, and detect its connection and whether conform to actual.
5. according to the encryption method of the electric detonator described in claim 1, it is characterized in that: after electronic detonator initiating finishes, fuzing information is sent to code data center and put on record.
6. according to the encryption method of the electric detonator described in claim 1, it is characterized in that: the identity ID coding of electric detonator comprises physical address and the delay time of electric detonator.
CN201010618762.XA 2010-12-31 2010-12-31 Encryption method for electronic detonators Active CN102564248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010618762.XA CN102564248B (en) 2010-12-31 2010-12-31 Encryption method for electronic detonators

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010618762.XA CN102564248B (en) 2010-12-31 2010-12-31 Encryption method for electronic detonators

Publications (2)

Publication Number Publication Date
CN102564248A CN102564248A (en) 2012-07-11
CN102564248B true CN102564248B (en) 2014-03-12

Family

ID=46410336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010618762.XA Active CN102564248B (en) 2010-12-31 2010-12-31 Encryption method for electronic detonators

Country Status (1)

Country Link
CN (1) CN102564248B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106293625A (en) * 2015-06-09 2017-01-04 中兴通讯股份有限公司 A kind of method and apparatus of configuration register
CN106643350B (en) * 2016-11-28 2017-12-22 娄文忠 The electric detonator system and its control method of a kind of two-way authentication
CN108955437A (en) * 2018-09-11 2018-12-07 江苏众芯邦软件科技有限公司 A kind of electric detonator detonation system and method
CN111666597B (en) * 2020-05-13 2021-05-18 上海微符尔半导体有限公司 On-chip storage method and device for electronic detonator chip
CN112325714B (en) * 2020-11-05 2022-11-22 南京雷芯聚力电子科技有限公司 Three-code-in-one system and method for electronic detonator
CN112595188A (en) * 2020-12-29 2021-04-02 四川省洪雅青衣江元明粉有限公司 Detonation control method for digital electronic detonator system
CN113014463B (en) * 2021-02-25 2022-04-19 上海赞芯电子科技有限公司 Communication method for electronic fuse
CN113218260B (en) * 2021-03-05 2024-01-19 北京煋邦数码科技有限公司 Method and device for controlling electronic detonator with curing delay and storage medium
CN113654421A (en) * 2021-08-03 2021-11-16 六盘水华安爆破工程有限公司 Linked mobile end detonation system and control method
CN114646242B (en) * 2022-03-28 2023-06-30 上海芯飏科技有限公司 High-reliability storage system, method, medium and equipment for electronic detonator chip

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1299110A (en) * 1999-12-03 2001-06-13 陆征军 Method for recognizing identity cards including IC card
CN1391082A (en) * 2002-03-08 2003-01-15 重庆大学 Network monitor method and device for easily exploding articles (detonator)
CN101465735A (en) * 2008-12-19 2009-06-24 北京大学 Network user identification verification method, server and client terminal
CN101488858A (en) * 2008-02-13 2009-07-22 刘海云 Random ciphering method which needs to be deciphered by exhaust algorithm
CN101644552A (en) * 2009-09-08 2010-02-10 北京维深数码科技有限公司 Novel digital electronic detonator and safe tracing and controlling method
CN101656608A (en) * 2008-08-21 2010-02-24 北京亿企通信息技术有限公司 Method and system for single login of Web end of instant messaging device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1299110A (en) * 1999-12-03 2001-06-13 陆征军 Method for recognizing identity cards including IC card
CN1391082A (en) * 2002-03-08 2003-01-15 重庆大学 Network monitor method and device for easily exploding articles (detonator)
CN101488858A (en) * 2008-02-13 2009-07-22 刘海云 Random ciphering method which needs to be deciphered by exhaust algorithm
CN101656608A (en) * 2008-08-21 2010-02-24 北京亿企通信息技术有限公司 Method and system for single login of Web end of instant messaging device
CN101465735A (en) * 2008-12-19 2009-06-24 北京大学 Network user identification verification method, server and client terminal
CN101644552A (en) * 2009-09-08 2010-02-10 北京维深数码科技有限公司 Novel digital electronic detonator and safe tracing and controlling method

Also Published As

Publication number Publication date
CN102564248A (en) 2012-07-11

Similar Documents

Publication Publication Date Title
CN102564248B (en) Encryption method for electronic detonators
CN101666600B (en) Novel digital electronic detonator initiator and control method thereof
CN109696097A (en) Digital electric detonator chip and control method based on dual-wire bus
CN201527238U (en) Novel digital electronic detonator initiator
CN101666598B (en) Digital electronic detonator blasting system and control method thereof
CN101666599B (en) Novel digital electronic detonator supervisory system and supervisory method thereof
CN102147219B (en) Electronic detonator supervision system and detonating authorization monitoring management method of electronic detonator supervision system
CN104296608A (en) Electronic detonator initiation system and method
CN101114161A (en) Safe type intelligent electric detonator control system and control method thereof
CN102121809B (en) Electronic detonator explosion network control device and control flow
CN201191166Y (en) Programmable electronic detonator delayed explosion system
CN201561710U (en) Digital electronic detonator explosion system
CN105066802B (en) Remote-controlled detonation system
CN114646243B (en) Digital detonator initiation control method and system for improving safety
CN201269721Y (en) Apparatus for alarming misfire information of blasting equipment
CN114111486B (en) Electronic detonator initiation device and working method thereof
CN109556473B (en) Industrial detonator initiator, terminal, system and method
CN101666596A (en) Novel digital electronic detonator and control method thereof
CN201764914U (en) Digital electronic detonator exploder with GPS locating function
CN110243240A (en) A kind of electronic detonator initiator by Beidou and UID code constrained and time
CN108847930A (en) A kind of data transmission method, device and fire-fighting system
CN201514165U (en) Novel digital electronic detonator
CN103743295A (en) Control method for realizing networking detonation of electronic detonator with single headset
CN204154195U (en) A kind of electric detonator detonation system
CN109855489A (en) A kind of igniting driving chip and control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 550000 Xintian Park, high tech Industrial Development Zone, Guiyang City, Guizhou Province

Co-patentee after: GUIZHOU JINGCHENGYU TECHNOLOGY Co.,Ltd.

Patentee after: Poly United Chemical Holding Group Co., Ltd

Address before: 5-6, building 213, 550002 North Baoshan Road, Guizhou, Guiyang

Co-patentee before: GUIZHOU JINGCHENGYU TECHNOLOGY Co.,Ltd.

Patentee before: GUIZHOU JIULIAN INDUSTRIAL EXPLOSIVE MATERIALS DEVELOPMENT Co.,Ltd.