CN112696995B - Electronic detonator network quick addressing method and device and electronic detonator system - Google Patents

Electronic detonator network quick addressing method and device and electronic detonator system Download PDF

Info

Publication number
CN112696995B
CN112696995B CN202011407539.0A CN202011407539A CN112696995B CN 112696995 B CN112696995 B CN 112696995B CN 202011407539 A CN202011407539 A CN 202011407539A CN 112696995 B CN112696995 B CN 112696995B
Authority
CN
China
Prior art keywords
electronic detonator
bytes
electronic
code
identification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011407539.0A
Other languages
Chinese (zh)
Other versions
CN112696995A (en
Inventor
黄圣专
关硕
王昭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Qaml Of Science And Technology Co ltd
Original Assignee
Shanghai Weifuer Semiconductor Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Weifuer Semiconductor Co ltd filed Critical Shanghai Weifuer Semiconductor Co ltd
Priority to CN202011407539.0A priority Critical patent/CN112696995B/en
Publication of CN112696995A publication Critical patent/CN112696995A/en
Application granted granted Critical
Publication of CN112696995B publication Critical patent/CN112696995B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C19/00Details of fuzes
    • F42C19/08Primers; Detonators
    • F42C19/12Primers; Detonators electric

Abstract

The invention provides a method and a device for quickly addressing an electronic detonator network and an electronic detonator system, wherein the method comprises the following steps: acquiring an identifiable unique code of an electronic detonator in an electronic detonator network, wherein the identifiable unique code comprises data corresponding to partial bytes of an identification code of the electronic detonator, and the identifiable unique codes corresponding to the electronic detonators in the electronic detonator network are different; generating control information according to the identifiable unique code; and sending the control information to the electronic detonator so that the electronic detonator verifies whether the recognizable unique code is the data corresponding to the partial byte of the identification code, and executes the control information corresponding instruction after the verification is passed. The embodiment of the invention not only meets the requirement of each electronic detonator for verifying the control information, but also can shorten the length of the control information, thereby reducing the communication data volume and reducing the communication time consumption.

Description

Electronic detonator network quick addressing method and device and electronic detonator system
Technical Field
The invention relates to the technical field of detonator addressing, in particular to a method and a device for quickly addressing an electronic detonator network and an electronic detonator system.
Background
In an electronic detonator network consisting of multiple electronic detonators, each electronic detonator is provided with a Unique Identifier Definition (UID) to communicate with an initiator, namely each electronic detonator is provided with a Unique Identifier/address. To accommodate a sufficient number of electronic detonators, the UID is typically set to 7bytes or even longer. Taking 7bytes as an example, with a length of 56 bits, 7.2x10 can be identified16An electronic detonator.
In order to ensure the safety of detonation, a safety distance is required to be kept between the detonator and the electronic detonator network on the detonation site, and the safety distance is generally more than 600 meters. In order to ensure the stability of long-distance communication, a relatively low communication speed, such as 1-4 Kbps, is selected for communication between the initiator and the electronic detonator. Taking the communication rate of 1Kbps as an example, the duration of issuing the delay parameter (the length of the delay parameter is assumed to be 2 bytes) to the single-shot electronic detonator by the detonator is about 100 ms. If 1000 electronic detonators exist in the electronic detonator network, the delay time of all the electronic detonators can be set within 10s, so that the communication time of the electronic detonator network is too long.
Disclosure of Invention
The invention solves the problem that the communication time of the existing electronic detonator network is too long.
In order to solve the above problems, the present invention provides a method for fast addressing an electronic detonator network, which is applied to a control terminal, and the method comprises: acquiring an identifiable unique code of an electronic detonator in an electronic detonator network, wherein the identifiable unique code comprises data corresponding to partial bytes of an identification code of the electronic detonator, and the identifiable unique codes corresponding to the electronic detonators in the electronic detonator network are different; generating control information according to the identifiable unique code; and sending the control information to the electronic detonator so that the electronic detonator verifies whether the identifiable unique code is data corresponding to partial bytes of the identification code, and executes the control information corresponding instruction after the verification is passed.
Optionally, the method further comprises: obtaining the identification codes of all electronic detonators in the electronic detonator network through single detection; and comparing the identification codes of the electronic detonators byte by byte to determine the identifiable unique code of the electronic detonators in the electronic detonator network.
Optionally, the comparing the identification codes of the electronic detonators byte by byte to determine the identifiable unique code of each electronic detonator in the electronic detonator network includes: comparing the data corresponding to N bytes of the identification code of the target electronic detonator with the data corresponding to N bytes of the corresponding position of the identification code of each other electronic detonator; the identification code of the target electronic detonator comprises M bytes, wherein N < M, N, M are positive integers; and continuously comparing after adding one to N, and taking the data corresponding to N bytes of the identification code of the target electronic detonator which is different from other electronic detonators and has the shortest length as the identifiable unique code of the target electronic detonator in the electronic detonator network.
Optionally, the identifiable unique code is a plurality of bytes of corresponding data starting from a first byte of the identification code of the electronic detonator; or, the recognizable unique code is data corresponding to a plurality of continuous bytes starting from the last byte of the identification code.
The invention provides a method for quickly addressing an electronic detonator network, which is applied to an electronic detonator and comprises the following steps: receiving control information sent by a control terminal, wherein the control information comprises an identifiable unique code; verifying whether the identifiable unique code is data corresponding to partial bytes of the identification code corresponding to the electronic detonator; and executing the control information corresponding instruction after the verification is passed.
Optionally, the verifying whether the recognizable unique code is partial byte corresponding data of the identification code corresponding to the electronic detonator includes: determining the number of the recognizable unique code bytes; extracting first data corresponding to a first byte of the identification code starting from the continuous number of bytes, and verifying whether the identifiable unique code is the same as the first data; extracting second data corresponding to the number of bytes which are continuous from the last byte of the identification code, and verifying whether the recognizable unique code is the same as the second data.
Optionally, the determining the number of distinguishable unique code bytes comprises: determining a total number of bytes of the control information and a number of bytes of an information code, the information code including at least one of: instruction codes, parameter codes and check codes; and subtracting the byte number of the information code from the total byte number to obtain the number of the distinguishable unique code bytes.
The invention provides a fast addressing device of an electronic detonator network, which is applied to a control terminal and comprises: the electronic detonator identification module is used for acquiring an identifiable unique code of an electronic detonator in an electronic detonator network, wherein the identifiable unique code comprises data corresponding to partial bytes of an identification code of the electronic detonator, and the identifiable unique codes corresponding to the electronic detonators in the electronic detonator network are different; the generating module is used for generating control information according to the identifiable unique code; and the sending module is used for sending the control information to the electronic detonator so that the electronic detonator verifies whether the identifiable unique code is data corresponding to partial bytes of the identification code, and executes the control information corresponding instruction after the verification is passed.
The invention provides a fast addressing device of an electronic detonator network, which is applied to an electronic detonator, and comprises: the receiving module is used for receiving control information sent by the control terminal, and the control information comprises an identifiable unique code; the verification module is used for verifying whether the identifiable unique code is data corresponding to partial bytes of the identification code corresponding to the electronic detonator; and the execution module is used for executing the control information corresponding instruction after the verification is passed.
The invention provides an electronic detonator system, which comprises a control terminal and a plurality of electronic detonators; the control terminal comprises the electronic detonator network quick addressing device, and the electronic detonator comprises the electronic detonator network quick addressing device.
The control information sent by the control terminal to the electronic detonator in the embodiment of the invention comprises the identifiable unique code of the electronic detonator, the identifiable unique code only comprises data corresponding to partial bytes of the identification code, and the identifiable unique codes corresponding to the electronic detonators are different, so that the requirement of verifying the control information by each electronic detonator is met, the length of the control information can be shortened, the communication data volume is reduced, and the communication time is shortened.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a schematic flow chart of a method for fast addressing of an electronic detonator network in one embodiment of the present invention;
FIG. 2 is a schematic flow chart of another method for fast addressing of an electronic detonator network in an embodiment of the present invention;
FIG. 3 is a schematic flow diagram of an electronic detonator demodulation process of a prior addressing method;
FIG. 4 is a schematic flow diagram of an electronic detonator demodulation process of a method for fast addressing of an electronic detonator network in one embodiment of the present invention;
FIG. 5 is a schematic structural diagram of a fast addressing apparatus for an electronic detonator network according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of another fast addressing device for an electronic detonator network according to an embodiment of the present invention.
Description of reference numerals:
501-an obtaining module; 502-a generation module; 503-a sending module; 601-a receiving module; 602-a verification module; 603-execution module.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment is applied to an electronic detonator system, and comprises a control terminal and an electronic detonator network consisting of a plurality of electronic detonators. Each electronic detonator corresponds to a unique identification code, such as a UID or a unique identification address. The method for rapidly addressing the electronic detonator network provided by the embodiment can be used for addressing with variable address length on the basis of the above technology, so that the communication time consumption is reduced.
Fig. 1 is a schematic flow chart of a method for rapidly addressing an electronic detonator network, which is applied to a control terminal and includes the following steps:
and S102, acquiring the identifiable unique code of the electronic detonator in the electronic detonator network.
The identifiable unique code comprises data corresponding to partial bytes of the identification code of the electronic detonator, and the byte length of the identifiable unique code is smaller than that of the identification code. The partial bytes may be a plurality of continuous bytes in the identification code, or a plurality of continuous bytes in the middle of the identification code.
Because the electronic detonators in the electronic detonator network are from the same batch/similar batches of products with high probability, the identification codes of the electronic detonators are similar, and the number of the electronic detonators in the electronic detonator network is far less than the maximum identifiable number of the identification codes. Taking a 7-byte identification code as an example, it can identify 7.2x1016 electronic detonators, and the number of electronic detonators used in actual blasting is typically in the order of hundreds or thousands, so that no 7-byte UID is required to address a single-shot electronic detonator.
Optionally, the identifiable unique code is data corresponding to a plurality of consecutive bytes starting from a first byte of the identification code of the electronic detonator; or, the identifiable unique code is data corresponding to a plurality of continuous bytes starting from the last byte of the identifying code. Taking the identification code includes 7bytes of data as an example, a plurality of consecutive bytes in the identification code can be used as the recognizable unique code, for example, 5 consecutive bytes starting from the first byte of the identification code can be used as the recognizable unique code, or 5 consecutive bytes starting from the last byte of the identification code can be used as the recognizable unique code.
It should be noted that the identifiable unique codes corresponding to the electronic detonators in the electronic detonator network are different, and the byte lengths of the identifiable unique codes corresponding to the electronic detonators are not required to be the same. The identifiable unique code of the electronic detonator can be determined as follows: obtaining the identification codes of all electronic detonators in the electronic detonator network through single-shot detection; and comparing the identification codes of the electronic detonators byte by byte to determine the identifiable unique code of each electronic detonator in the electronic detonator network.
The byte-by-byte comparison described above may be performed as follows:
(1) and comparing the data corresponding to the N bytes of the identification code of the target electronic detonator with the data corresponding to the N bytes of the corresponding positions of the identification codes of other electronic detonators. The identification code of the target electronic detonator comprises M bytes, wherein N < M, N, M are positive integers.
(2) And continuously comparing after adding one to N, and taking the data corresponding to N bytes of the identification code of the target electronic detonator which is different from other electronic detonators and has the shortest length as the identifiable unique code of the target electronic detonator in the electronic detonator network.
For example, comparing the data corresponding to the 1 st byte of the identification code of the target electronic detonator with the data corresponding to the 1 st byte of the corresponding position of the identification codes of other electronic detonators, and if the data corresponding to the 1 st byte of the identification code of the target electronic detonator is different from the data corresponding to the 1 st byte of the identification codes of other electronic detonators, taking the data corresponding to the first byte as the recognizable unique code of the target electronic detonator in the electronic detonator network; if the data corresponding to the 1 st byte of the identification code of at least one other electronic detonator is the same, continuously comparing whether the data corresponding to the 1 st-2 th bytes is the same as the data corresponding to the 1 st-2 nd bytes of the identification codes of other electronic detonators, if the data corresponding to the 1 st-2 nd bytes is the same as the data corresponding to the 1 st-2 nd bytes of the identification codes of at least one other electronic detonator, continuously comparing whether the data corresponding to the 1 st-3 rd bytes is the same as the data corresponding to the 1 st-3 rd bytes of the identification codes of other electronic detonators until the data corresponding to the bytes corresponding to other electronic detonators are different, and taking the data corresponding to the byte with the shortest length as an identifiable unique code.
Similarly, the byte length of the comparison data can be increased byte by byte from the last 1byte of the identification code, and then the comparison is carried out to determine the identifiable unique code of each electronic detonator in the electronic detonator network. The byte length of the identifiable unique code corresponding to each electronic detonator can be different.
And S104, generating control information according to the identifiable unique code. Typically the control information may comprise instruction codes, parameter codes, check codes, etc. data.
S106, the control information is sent to the electronic detonator, so that the electronic detonator verifies whether the recognizable unique code is the data corresponding to the partial byte of the identification code, and executes the control information corresponding instruction after the verification is passed.
A demodulation mode is pre-configured in the electronic detonator, so that the electronic detonator is suitable for the verification requirement of the identifiable unique code. The electronic detonator can verify whether data with the same byte length as the received identifiable unique code exists in the identification code of the electronic detonator through the received byte length of the identifiable unique code. And if the verification is passed, executing the control information corresponding instruction.
According to the method for quickly addressing the electronic detonator network, the control information sent to the electronic detonator by the control terminal comprises the identifiable unique code of the electronic detonator, the identifiable unique code only comprises data corresponding to partial bytes of the identification code, the identifiable unique codes corresponding to the electronic detonators are different, the requirement of verifying the control information by the electronic detonators is met, the length of the control information can be shortened, and therefore the communication data volume is reduced, and the communication time is shortened.
Fig. 2 is a schematic flow chart of a method for rapidly addressing an electronic detonator network, which is applied to an electronic detonator and includes the following steps:
and S202, receiving the control information sent by the control terminal. The control information includes a recognizable unique code.
And S204, verifying whether the identifiable unique code is data corresponding to partial bytes of the identification code corresponding to the electronic detonator.
And a demodulation mode is pre-configured in the electronic detonator, and corresponds to a generation mode of the identifiable unique code of the electronic detonator. After receiving the recognizable unique code, it can be verified whether it is part of the identification code. The verification process corresponds to the generation method.
Taking the example of the first byte of the identification code from the electronic detonator, or the last byte of the identification code, the first byte of which is the corresponding data of a plurality of consecutive bytes, the identification code can be verified according to the following steps:
(1) the number of distinguishable unique code bytes is determined. First, a total byte number of the control information and a byte number of an information code are determined, and the information code may include: instruction codes, parameter codes, check codes, and the like; then, the number of the bytes of the information code is subtracted from the total number of the bytes to obtain the number of the identifiable unique code bytes.
(2) Extracting first data corresponding to a first byte of the identification code and starting a continuous number of bytes, and verifying whether the identifiable unique code is the same as the first data;
(3) second data corresponding to the last byte of the identification code and the first continuous number of bytes is extracted, and whether the identifiable unique code is the same as the second data is verified.
It should be noted that the method provided in this embodiment is compatible with the existing communication method, i.e., the number of the unique code bytes is the same as the number of the identification code bytes, and the method can also perform verification and execute instructions, is safely compatible with the existing fixed UID length addressing method, and is suitable for the existing communication method.
And S206, executing the control information corresponding instruction after the verification is passed. If the verification fails, the control information is determined to be wrong, and the instruction is not executed.
According to the method for quickly addressing the electronic detonator network, the electronic detonator can receive the recognizable unique code sent by the control terminal, the recognizable unique code only comprises data corresponding to partial bytes of the identification code, the recognizable unique codes corresponding to the electronic detonators are different, and when the recognizable unique code is verified to be the same as the data corresponding to the partial bytes of the identification code of the electronic detonator, a corresponding instruction is executed, so that the requirement of verifying the control information by each electronic detonator is met, the length of the control information can be shortened, the communication data volume is reduced, and the communication time is shortened.
Fig. 3 is a schematic flow diagram of an electronic detonator demodulation process of a prior addressing method, the demodulation process comprising:
and S302, receiving a control command sent by the control terminal.
Generally, the format of the command issued by the control terminal is as follows: cmd + UID + Par + CRC. Wherein cmd represents an instruction code, UID represents an address/identification code, and Par represents parameters (delay time, hole bit number and the like); the CRC represents a check code for verifying the security of the communication data. Assuming that the cmd length is 1 byte; UID length is 7bytes, par length is 2bytes, and CRC length is 1 byte.
S304, comparing the 1 st byte of the control instruction with the instruction code, and verifying whether the byte is matched with the instruction code. If yes, executing S306; if not, the flow is ended.
S306, comparing the 2 nd byte to the 8 th byte of the control command with the UID of the electronic detonator, and verifying whether the bytes are matched. If yes, go to S308; if not, the flow is ended.
S308, taking all data of the control instruction except the CRC byte to perform CRC calculation, and verifying whether the data is matched with the last 1byte of the control instruction. If yes, go to S310; if not, the flow is ended.
And S310, writing parameters.
Fig. 4 is a schematic flow chart of an electronic detonator demodulation process of an electronic detonator network fast addressing method in an embodiment of the present invention, the demodulation process including:
s402, receiving a control command sent by the control terminal.
Assuming that the cmd length is 1 byte; UID length is 1-7 any number of bytes, par length is 2bytes, and CRC length is 1 byte.
S404, comparing the 1 st byte of the control instruction with the instruction code, and verifying whether the byte is matched with the instruction code. If yes, go to step S406; if not, the flow is ended.
S406, taking all data of the control instruction except the CRC byte to perform CRC calculation, and verifying whether the data is matched with the last 1byte of the control instruction. If yes, go to S408; if not, the flow is ended.
S408, taking the 2 nd byte to the 3 rd last byte of the control instruction as UID. The number of the corresponding bytes is X, and X is any integer from 1 to 7.
And S410, comparing the UID with X bytes of data at corresponding positions in the UID of the electronic detonator, and verifying whether the data are matched. If yes, go to step S412; if not, the flow is ended.
If X is 7, the method is the same as the conventional fixed UID length addressing method, and is compatible with the conventional communication method.
S412, writing parameters.
The variable address length addressing method provided by the embodiment is not limited by a specific communication mode, almost in a zero-cost mode, the communication speed of a large detonator network is improved, the communication time consumption is reduced, and the method is compatible with the conventional communication mode.
Fig. 5 is a schematic structural diagram of an electronic detonator network fast addressing device in an embodiment of the present invention, which is applied to a control terminal, and the device includes:
an obtaining module 501, configured to obtain an identifiable unique code of an electronic detonator in an electronic detonator network, where the identifiable unique code includes data corresponding to partial bytes of an identification code of the electronic detonator, and the identifiable unique codes corresponding to the electronic detonators in the electronic detonator network are different;
a generating module 502, configured to generate control information according to the recognizable unique code;
a sending module 503, configured to send the control information to the electronic detonator, so that the electronic detonator verifies whether the identifiable unique code is data corresponding to a partial byte of the identification code, and executes the control information corresponding instruction after the verification is passed.
According to the electronic detonator network rapid addressing device provided by the embodiment, the control information sent to the electronic detonators comprises the identifiable unique codes of the electronic detonators, the identifiable unique codes only comprise partial byte corresponding data of the identification codes, the identifiable unique codes corresponding to the electronic detonators are different, the requirement of verifying the control information of the electronic detonators is met, the length of the control information can be shortened, the communication data volume is reduced, and the communication time is shortened.
Optionally, as an embodiment, the apparatus further includes a determining module, configured to: obtaining the identification codes of all electronic detonators in the electronic detonator network through single detection; and comparing the identification codes of the electronic detonators byte by byte to determine the identifiable unique code of the electronic detonators in the electronic detonator network.
Optionally, as an embodiment, the determining module is further configured to: comparing the data corresponding to N bytes of the identification code of the target electronic detonator with the data corresponding to N bytes of the corresponding position of the identification code of each other electronic detonator; the identification code of the target electronic detonator comprises M bytes, wherein N < M, N, M are positive integers; (ii) a And continuously comparing after adding one to N, and taking the data corresponding to N bytes of the identification code of the target electronic detonator which is different from other electronic detonators and has the shortest length as the identifiable unique code of the target electronic detonator in the electronic detonator network.
Optionally, as an embodiment, the identifiable unique code is a plurality of consecutive bytes of corresponding data starting from a first byte of the identification code of the electronic detonator; or, the recognizable unique code is data corresponding to a plurality of continuous bytes starting from the last byte of the identification code.
Fig. 6 is a schematic structural diagram of an electronic detonator network fast addressing device in an embodiment of the present invention, which is applied to an electronic detonator, and the device includes:
a receiving module 601, configured to receive control information sent by a control terminal, where the control information includes an identifiable unique code;
a verification module 602, configured to verify whether the identifiable unique code is data corresponding to a part of bytes of the identification code corresponding to the electronic detonator;
and the executing module 603 is configured to execute the instruction corresponding to the control information after the verification is passed.
The electronic detonator network quick addressing device provided by the embodiment not only meets the requirement of verifying the control information of each electronic detonator, but also can shorten the length of the control information, thereby reducing the communication data volume and reducing the communication time consumption.
Optionally, as an embodiment, the verification module 602 is specifically configured to: determining the number of the recognizable unique code bytes; extracting first data corresponding to a first byte of the identification code starting from the continuous number of bytes, and verifying whether the identifiable unique code is the same as the first data; extracting second data corresponding to the number of bytes which are continuous from the last byte of the identification code, and verifying whether the recognizable unique code is the same as the second data.
Optionally, as an embodiment, the verification module 602 is specifically configured to: determining a total number of bytes of the control information and a number of bytes of an information code, the information code including at least one of: instruction codes, parameter codes and check codes; and subtracting the byte number of the information code from the total byte number to obtain the number of the distinguishable unique code bytes.
The electronic detonator network fast addressing device provided by the above embodiment can realize each process in the above embodiment of the electronic detonator network fast addressing method, and is not described here again to avoid repetition.
The embodiment of the invention also provides an electronic detonator system, which comprises a control terminal and a plurality of electronic detonators; the control terminal comprises the electronic detonator network quick addressing device, and the electronic detonator comprises the electronic detonator network quick addressing device.
The embodiment of the invention also provides a computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when being executed by a processor, the computer program realizes each process of the embodiment of the electronic detonator network fast addressing method, and can achieve the same technical effect, and is not repeated here to avoid repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Of course, those skilled in the art will understand that all or part of the processes in the methods of the above embodiments may be implemented by instructing the control device to perform operations through a computer, and the programs may be stored in a computer-readable storage medium, and when executed, the programs may include the processes of the above method embodiments, where the storage medium may be a memory, a magnetic disk, an optical disk, and the like.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (8)

1. A method for quickly addressing an electronic detonator network is applied to a control terminal, and comprises the following steps:
acquiring an identifiable unique code of an electronic detonator in an electronic detonator network, wherein the identifiable unique code comprises data corresponding to partial bytes of an identification code of the electronic detonator, and the identifiable unique codes corresponding to the electronic detonators in the electronic detonator network are different; the identification codes of all electronic detonators in the electronic detonator network are obtained through single-shot detection; comparing the identification codes of the electronic detonators byte by byte to determine the identifiable unique code of the electronic detonators in the electronic detonator network, wherein the identification code comprises the following steps: comparing the data corresponding to N bytes of the identification code of the target electronic detonator with the data corresponding to N bytes of the corresponding position of the identification code of each other electronic detonator; the identification code of the target electronic detonator comprises M bytes, wherein N < M, N, M are positive integers; adding one to N, and then continuously comparing, wherein the data corresponding to N bytes at the corresponding positions of the identification codes of other electronic detonators are different, and the data corresponding to N bytes of the identification code of the target electronic detonator with the shortest length is used as the identifiable unique code of the target electronic detonator in the electronic detonator network;
generating control information according to the identifiable unique code;
and sending the control information to the electronic detonator so that the electronic detonator verifies whether the identifiable unique code is data corresponding to partial bytes of the identification code, and executes the control information corresponding instruction after the verification is passed.
2. A method according to claim 1, wherein the distinguishable unique code is a consecutive plurality of bytes of corresponding data starting from a first byte of the identification code of the electronic detonator; or the like, or, alternatively,
the identifiable unique code is a plurality of bytes of corresponding data which are continuous from the last byte of the identifying code.
3. A method for quickly addressing an electronic detonator network is applied to an electronic detonator, and comprises the following steps:
receiving control information sent by a control terminal, wherein the control information comprises identifiable unique codes, and the identifiable unique codes corresponding to the electronic detonators in the electronic detonator network are different; the identification codes of all electronic detonators in the electronic detonator network are obtained through single-shot detection; comparing the identification codes of the electronic detonators byte by byte to determine the identifiable unique code of the electronic detonators in the electronic detonator network, wherein the identification code comprises the following steps: comparing the data corresponding to N bytes of the identification code of the target electronic detonator with the data corresponding to N bytes of the corresponding position of the identification code of each other electronic detonator; the identification code of the target electronic detonator comprises M bytes, wherein N < M, N, M are positive integers; adding one to N, and then continuously comparing, wherein the data corresponding to N bytes at the corresponding positions of the identification codes of other electronic detonators are different, and the data corresponding to N bytes of the identification code of the target electronic detonator with the shortest length is used as the identifiable unique code of the target electronic detonator in the electronic detonator network;
verifying whether the identifiable unique code is data corresponding to partial bytes of the identification code corresponding to the electronic detonator;
and executing the control information corresponding instruction after the verification is passed.
4. The method according to claim 3, wherein the verifying whether the distinguishable unique code is partial byte corresponding data of the corresponding identification code of the electronic detonator comprises:
determining the number of the recognizable unique code bytes;
extracting first data corresponding to a first byte of the identification code starting from the continuous number of bytes, and verifying whether the identifiable unique code is the same as the first data;
extracting second data corresponding to the number of bytes which are continuous from the last byte of the identification code, and verifying whether the recognizable unique code is the same as the second data.
5. The method according to claim 4, wherein the determining the number of distinguishable unique code bytes comprises:
determining a total number of bytes of the control information and a number of bytes of an information code, the information code including at least one of: instruction codes, parameter codes and check codes;
and subtracting the byte number of the information code from the total byte number to obtain the number of the distinguishable unique code bytes.
6. An electronic detonator network quick addressing device is characterized by being applied to a control terminal, and the device comprises:
the electronic detonator identification module is used for acquiring an identifiable unique code of an electronic detonator in an electronic detonator network, wherein the identifiable unique code comprises data corresponding to partial bytes of an identification code of the electronic detonator, and the identifiable unique codes corresponding to the electronic detonators in the electronic detonator network are different; the identification codes of all electronic detonators in the electronic detonator network are obtained through single-shot detection; comparing the identification codes of the electronic detonators byte by byte to determine the identifiable unique code of the electronic detonators in the electronic detonator network, wherein the identification code comprises the following steps: comparing the data corresponding to N bytes of the identification code of the target electronic detonator with the data corresponding to N bytes of the corresponding position of the identification code of each other electronic detonator; the identification code of the target electronic detonator comprises M bytes, wherein N < M, N, M are positive integers; adding one to N, and then continuously comparing, wherein the data corresponding to N bytes at the corresponding positions of the identification codes of other electronic detonators are different, and the data corresponding to N bytes of the identification code of the target electronic detonator with the shortest length is used as the identifiable unique code of the target electronic detonator in the electronic detonator network;
the generating module is used for generating control information according to the identifiable unique code;
and the sending module is used for sending the control information to the electronic detonator so that the electronic detonator verifies whether the identifiable unique code is data corresponding to partial bytes of the identification code, and executes the control information corresponding instruction after the verification is passed.
7. An electronic detonator network quick addressing device is characterized by being applied to an electronic detonator, and the device comprises:
the receiving module is used for receiving control information sent by the control terminal, and the control information comprises an identifiable unique code;
the verification module is used for verifying whether the identifiable unique code is data corresponding to partial bytes of the identification code corresponding to the electronic detonator; the identifiable unique codes corresponding to the electronic detonators in the electronic detonator network are different; the identification codes of all electronic detonators in the electronic detonator network are obtained through single-shot detection; comparing the identification codes of the electronic detonators byte by byte to determine the identifiable unique code of the electronic detonators in the electronic detonator network, wherein the identification code comprises the following steps: comparing the data corresponding to N bytes of the identification code of the target electronic detonator with the data corresponding to N bytes of the corresponding position of the identification code of each other electronic detonator; the identification code of the target electronic detonator comprises M bytes, wherein N < M, N, M are positive integers; adding one to N, and then continuously comparing, wherein the data corresponding to N bytes at the corresponding positions of the identification codes of other electronic detonators are different, and the data corresponding to N bytes of the identification code of the target electronic detonator with the shortest length is used as the identifiable unique code of the target electronic detonator in the electronic detonator network;
and the execution module is used for executing the control information corresponding instruction after the verification is passed.
8. An electronic detonator system is characterized by comprising a control terminal and a plurality of electronic detonators;
the control terminal comprises the electronic detonator network quick addressing device as claimed in claim 6, and the electronic detonator comprises the electronic detonator network quick addressing device as claimed in claim 7.
CN202011407539.0A 2020-12-04 2020-12-04 Electronic detonator network quick addressing method and device and electronic detonator system Active CN112696995B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011407539.0A CN112696995B (en) 2020-12-04 2020-12-04 Electronic detonator network quick addressing method and device and electronic detonator system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011407539.0A CN112696995B (en) 2020-12-04 2020-12-04 Electronic detonator network quick addressing method and device and electronic detonator system

Publications (2)

Publication Number Publication Date
CN112696995A CN112696995A (en) 2021-04-23
CN112696995B true CN112696995B (en) 2021-09-28

Family

ID=75506849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011407539.0A Active CN112696995B (en) 2020-12-04 2020-12-04 Electronic detonator network quick addressing method and device and electronic detonator system

Country Status (1)

Country Link
CN (1) CN112696995B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2021290430B2 (en) * 2021-12-21 2023-09-07 Hanwha Corporation Apparatus and method for searching for unregistered detonator in detonator list and confirming ID

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114909964B (en) * 2022-03-29 2024-02-09 上海雷芯半导体有限公司 Method for reporting measured voltage of electronic detonator and control chip
CN115164658B (en) * 2022-07-08 2023-09-19 融硅思创(北京)科技有限公司 Automatic digital electronic detonator online system and communication method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
PE20061227A1 (en) * 2005-01-24 2006-12-19 Orica Explosives Tech Pty Ltd ASSEMBLIES OF WIRELESS DETONATORS AND CORRESPONDING NETWORKS
CN101408396B (en) * 2008-11-26 2013-08-07 北京维深数码科技有限公司 Digital electric detonator ignition system based on biometric identification technology
CN108885081A (en) * 2016-03-29 2018-11-23 陈默 Electric detonator searching method for Tunnel Blasting
CN110986703B (en) * 2019-11-08 2022-06-17 重庆云铭科技股份有限公司 Electronic detonator network anti-collision method
CN111854548A (en) * 2020-07-31 2020-10-30 重庆云铭科技股份有限公司 UID code feature extraction method for electronic detonator

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2021290430B2 (en) * 2021-12-21 2023-09-07 Hanwha Corporation Apparatus and method for searching for unregistered detonator in detonator list and confirming ID

Also Published As

Publication number Publication date
CN112696995A (en) 2021-04-23

Similar Documents

Publication Publication Date Title
CN112696995B (en) Electronic detonator network quick addressing method and device and electronic detonator system
US9332430B2 (en) Method of identifying and authenticating a radio tag by a reader
CN108279910B (en) Program code programming method and device, computer equipment and storage medium
CN106326749A (en) File repairing method and device
US8866585B2 (en) Method for challenge response authentication between a reading device and a transponder using contactless data transmission
CN113467813A (en) Controller online upgrading method and device, electronic equipment and storage medium
CN110401658B (en) Data interaction method and interaction platform
CN113872735A (en) Data transmission method, device and equipment
CN105550867A (en) Information authentication method and equipment
CN111262697A (en) Chip wafer test control method and device and chip
CN117155782A (en) Method for automatically analyzing communication parameters
CN113010190A (en) MAC address burning method, device, equipment and storage medium
CN109947776B (en) Data compression and decompression method and device
CN101197959A (en) Terminal control method, system and equipment
CN110413341A (en) A kind of starting method, apparatus, terminal and the medium of application program
CN113074595B (en) Data writing method and system of electronic detonator, electronic detonator and initiator
CN109413450A (en) A kind of integrity checking method, device, terminal and the storage medium of barrage data
CN101635742A (en) Downloading method and device
CN101571808B (en) Method for improving production efficiency of telecommunication smart card
CN110059109B (en) Device, method and storage medium for data query
CN109358981B (en) Memory read error correction method, system, computer device, and storage medium
CN109889305B (en) Communication frame forwarding method, communication node, multi-node communication method and device
CN203605833U (en) Electronic detonator detonation control network
CN116793170A (en) Detonation control method and detonation control system
CN113131945A (en) Initiator data encoding method, electronic device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221129

Address after: 550000 Standard Plant 12 # in South Park of High end Equipment Manufacturing Industrial Park, Gui'an New District, Guiyang City, Guizhou Province

Patentee after: GUIZHOU QAML OF SCIENCE AND TECHNOLOGY CO.,LTD.

Address before: Room 410, South Building, building 1, 350 Chunxiao Road, Shanghai pilot Free Trade Zone, 201203

Patentee before: Shanghai weifuer Semiconductor Co.,Ltd.