CN114646243A - Digital detonator detonation control method and system for improving safety - Google Patents

Digital detonator detonation control method and system for improving safety Download PDF

Info

Publication number
CN114646243A
CN114646243A CN202210490824.6A CN202210490824A CN114646243A CN 114646243 A CN114646243 A CN 114646243A CN 202210490824 A CN202210490824 A CN 202210490824A CN 114646243 A CN114646243 A CN 114646243A
Authority
CN
China
Prior art keywords
detonator
detonation
information
sending
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210490824.6A
Other languages
Chinese (zh)
Other versions
CN114646243B (en
Inventor
王元康
孟伟斌
胡南奇
张闻义
袁顺芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Hangxin Technology Co ltd
Original Assignee
Zhejiang Hangxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Hangxin Technology Co ltd filed Critical Zhejiang Hangxin Technology Co ltd
Priority to CN202210490824.6A priority Critical patent/CN114646243B/en
Publication of CN114646243A publication Critical patent/CN114646243A/en
Application granted granted Critical
Publication of CN114646243B publication Critical patent/CN114646243B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C19/00Details of fuzes
    • F42C19/08Primers; Detonators
    • F42C19/12Primers; Detonators electric
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C19/00Details of fuzes
    • F42C19/08Primers; Detonators

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the technical field of digital detonator control, and particularly discloses a digital detonator detonation control method and a digital detonator detonation control system for improving safety, wherein the method comprises the following steps: an ID number and a password of an operator are input through the APP to log in the initiator, and identity information of the initiator is uploaded to the cloud server; synthesizing the detonation password, the digital detonator UID code, the digital detonator shell code and the detonation password into a work code, and checking the work code with an authorization code, wherein if the work code is checked to be wrong, the detonation cannot be carried out; after the digital detonator is subjected to online networking nondestructive testing, the digital detonator is charged, the detonator is detonated, and the electronic switch is disconnected with the physical bus; and recording detonation time, UID (user identification) codes, longitude and latitude, blasting operator information, blasting article information and counting information after blasting of the online detonators to form blasting record information and upload the blasting record information to the cloud server. The data of each detonator can be ensured to be checked, the safety is higher, the accident responsibility can be conveniently traced, and the social stability is maintained.

Description

Digital detonator detonation control method and system for improving safety
Technical Field
The invention belongs to the technical field of digital detonator control, and particularly relates to a digital detonator detonation control method and a digital detonator detonation control system for improving safety.
Background
The digital detonator is applied to mine blasting engineering, tunnel underground blasting engineering, demolition blasting, underwater blasting and complex environment control blasting. The damage effect of blasting vibration can be effectively controlled by adopting the digital detonator, and the blasting and crushing effect is improved; meanwhile, presplitting blasting is adopted, so that the intensity of blasting vibration can be better controlled: in addition, low-frequency seismic waves can be converted into high-frequency seismic waves which are uniformly distributed by optimizing millisecond delay interval time, so that effective control of blasting vibration damage is realized. The existing digital electronic detonators are various due to production or use reasons, but the existing digital electronic detonators are classified into two types according to the initiation process:
the digital detonator without the energy storage and initiation function needs the initiator with the energy storage function, and the initiator energy storage module is used for discharging and initiating the digital detonator. And the coal mine blasting prevents gas explosion due to the importance and danger, so the used digital detonator has no energy storage function and needs an initiator to be capable of initiating.
The second type is a digital detonator with a small-capacity energy storage and initiation function, the initiator can charge and store energy in an energy storage module of the digital detonator before initiation, the initiator sends an initiation instruction, and the energy storage module releases energy after the digital detonator is read to initiate the digital detonator.
However, after the detonator is exploded, the source of the detonator cannot be traced, the use mode of the detonator is not standardized, and the major accidents caused by the detonation of a detonator by a criminal or the negligence and illegal operation of a practitioner cannot be prevented, so that the stability of the society is damaged.
Disclosure of Invention
The invention aims to provide a digital detonator detonation control method and a digital detonator detonation control system for improving safety, which can solve the technical problem that sources cannot be tracked due to the fact that detonators are not used in a standard mode.
The invention provides a digital detonator detonation control method for improving safety, which comprises the following steps of:
s1, inputting an operator ID number and a password through the APP to log in the initiator, and uploading identity information of the initiator to a cloud server;
s2, combining the detonation password, the digital detonator UID code and the digital detonator shell code into a working code, and checking the working code with an authorization code, wherein if the working code is checked to be wrong, the detonation cannot be carried out;
s3, after the verification is correct, the APP sends an authorization file to the detonator, after the online networking nondestructive testing of the digital detonator is correct, the digital detonator is charged, the detonator is detonated, and the electronic switch is disconnected with the physical bus connection;
and S4, finishing detonation, recording detonation time, UID (user identification) code, longitude and latitude, information of blasting operators, information of blasted articles and counting information after blasting to form blasting record information and uploading the blasting record information to a cloud server.
Preferably, the S1 specifically includes: the ID number and the password of an operator are input through the mobile phone APP to log in the initiator, the mobile phone APP collects identity card information of the initiator and conducts face recognition, the identity information of the initiator is uploaded to the cloud server, the identity information comprises the identity card information, face recognition information and a contact mode, and if any one of the identity information is not matched, detonation cannot be conducted.
Preferably, the S2 specifically includes:
calling a GPS (global positioning system) of the mobile phone, and when a GPS positioning module of the detonator is not in a detonation-allowed area, detonating cannot be carried out;
calling a GPS (global positioning system) of the mobile phone, and when a GPS positioning module of the detonator is in a detonation forbidden area, detonating cannot be carried out;
the mobile phone Bluetooth is not connected with the detonator, so the mobile phone cannot detonate.
Preferably, the S2 further includes: and extracting key information of the detonation date, the detonation position and the detonation password from the authorization code, comparing the key information with the detonation position and the detonation password, and informing the detonator to allow detonation after the comparison is successful.
Preferably, the synthesizing of the working code in S2 specifically includes: the UID code of the digital detonator is coded into 13-bit bytes, the shell code of the digital detonator is coded into 13-bit bytes, the detonation password is coded into 8-bit bytes, the detonation password, the UID code of the digital detonator and the shell code of the digital detonator are bound, and the SAM card secret key is used for forming a working code without human intervention and automatic encryption.
Preferably, the S3 specifically includes: the mobile phone is communicated with the detonator through Bluetooth, and the detonator receives the authorization file, extracts and stores the detonation password of each detonator.
Preferably, before the broadcast initiation in S3, the method further includes the following steps:
1) sending a mode switching instruction, and switching to a registration mode;
2) only connecting a single detonator leg wire, and sending a bus power supply instruction, wherein the voltage of the bus AB is 12V;
3) waiting for 100ms after power supply, sending a detonator configuration information acquisition instruction, acquiring the UID length, the detonation password length and the version information used by the detonator, and performing error prompt when the read configuration information does not meet the requirements, and ending the process;
4) sending a scanning instruction, acquiring the UID and the state information of the detonator, recording the UID in the detonator, and checking whether the state information is correct or not;
5) sending a command for writing a delay value and a hole site value, using UID (user identification) for addressing, and writing the delay value and the hole site value of the detonator;
6) sending a read delay value and hole position value instruction, reading the corresponding values written in the previous step, and confirming that the writing is successful;
7) and sending a bus power-off instruction.
Preferably, the digital detonator online networking in S3 specifically includes:
1) connecting a bus, sending a mode switching instruction, setting the mode of the module to be a networking mode, and continuously supplying power for the bus by 16V at the moment;
2) the bus supplies power for a period of time, and then sends 3 discharging instructions at intervals of at least 10 ms; sending a detonator initialization instruction for 3 times at an interval of at least 500 ms;
3) sending a command for acquiring detonator configuration information, and acquiring UID length, detonation code length and version information used by the detonator;
4) sending a command of writing the delay value and the hole site value, and writing the delay value and the hole site value one by one according to the UID registered by scanning the code;
5) sending an instruction for clearing the UID read state, continuously sending scanning instructions until all the detonators in the network are scanned out or the data are all 0 in 10 times continuously, determining that all the registered detonators are in the network and the condition of no disconnection exists, and detecting the state bit information of each detonator;
the status bit information of the initial detonator is 0x00, if the delay value and the hole bit value obtained by detonator scanning do not accord with the value written in the step 4), the step 4) should be executed again for the non-conforming detonators, and then the step 5) is executed again for all the detonators);
6) if the detonator is not scanned or the unregistered detonator is scanned, transmitting a delay value and a hole site value instruction roll call to confirm the state information of the detonator, or repeatedly executing the step 5);
7) and sending a delay calibration instruction to perform broadcast delay calibration.
Preferably, the specific steps of initiating the initiator in S3 include:
a) sending a command for verifying the detonation passwords and verifying the detonation passwords of all detonators;
b) sending a command for clearing the UID read state, then continuously sending scanning commands until all detonators in the network are scanned out or all data are 0 for 10 times continuously, determining that the current detonators are still all in the network and have no disconnection, and detecting state bit information and delay and hole site value information of each detonator;
c) if the detonator is not scanned or the detonator is scanned to be unregistered, transmitting a delay value and a hole site value instruction roll call to confirm the state information of the detonator or rescanning;
d) if the step b is correctly carried out and the steps are correctly carried out, if a delay value and hole position value reading instruction is sent, the read detonator state bit information is 0x 0D;
e) when the status bit scanned in the step b shows that the calibration is unsuccessful, determining delay time, then sending a delay calibration instruction, and broadcasting delay calibration;
f) when the status bit scanned in the step b shows that the verification of the detonation password is unsuccessful, confirming the detonation password, re-executing the step a, and sending the detonation password corresponding to the detonator which is not verified;
g) and sending the instructions of the read delay value and the hole position value according to the detonators UIDs with all state bit errors. Reading the status bits of the detonators again, if the status bits are still wrong, sending a discharging instruction for 3 times, and sending a detonator resetting instruction for 3 times; removing the detonator with the problem, and then performing networking detonation flow again;
h) sending a charging 22v instruction, charging at high voltage and preparing for detonation;
i) and sending a verification and detonation instruction, verifying the states of all detonators, entering a detonation delay if the states of all detonators are normal, and detonating when the delay time is reached.
The invention also provides a digital detonator detonation control system for improving the safety, which is used for realizing the digital detonator detonation control method for improving the safety and comprises the following steps:
the APP inputs an ID number and a password of an operator through the APP to log in the initiator, and the identity information of the initiator is uploaded to the cloud server; combining the operation password, the digital detonator UID code, the digital detonator shell code and the initiation password into a working code, and checking the working code with an authorization code, wherein if the working code is checked to be wrong, initiation cannot be carried out; after the error is checked, the APP sends an authorization file to the detonator;
the server is used for recording detonation time, UID (user identification) codes, longitude and latitude, information of blasting operators, information of detonation articles and counting information after detonation;
and the primer is used for charging the digital detonators after the online networking nondestructive detection of the digital detonators is correct, the primer detonators explode, and the electronic switch is disconnected from the physical bus connection.
Compared with the prior art, the digital detonator detonation control method and system for improving the safety provided by the invention comprise the following steps: an ID number and a password of an operator are input through an APP to log in an initiator, and identity information of the initiator is uploaded to a cloud server; combining the detonation password, the digital detonator UID code, the digital detonator shell code and the detonation password into a working code, and checking the working code with an authorization code, wherein if the working code is checked to be wrong, the detonation cannot be carried out; after the digital detonator is subjected to online networking nondestructive testing, the digital detonator is charged, the detonator is detonated, and the electronic switch is disconnected with the physical bus; and after detonation is finished, recording detonation time, UID (user identifier) code, longitude and latitude, information of blasting operators, information of detonation articles and counting information after detonation of the online detonator to form blasting record information and upload the blasting record information to the cloud server. By setting multiple technical measures, the safe detonation of the digital detonator is ensured. The method comprises the steps of generating detailed detonation information records and uploading the information of the password function of the APP end of the mobile phone, face recognition, GPS positioning detonation judgment, Bluetooth communication judgment, three-code-in-one working code weight judgment, authorization file judgment, digital detonator single shot detection, digital detonator networking and digital detonator detonation control. The data of each detonator can be checked, the safety is higher, the accident responsibility can be conveniently traced, major accidents caused by the fact that the detonator is detonated by criminals or careless and illegal operations of practitioners are effectively prevented, and the stability of the society is damaged.
Drawings
FIG. 1 is a flow chart of a digital detonator detonation control method for improving safety according to the present invention;
fig. 2 is a schematic block diagram of a digital detonator detonation control system for improving safety provided by the invention.
Detailed Description
The following detailed description of the present invention is provided in conjunction with the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element or component but not the exclusion of any other element or component.
As shown in fig. 1, a digital detonator detonation control method for improving safety according to a preferred embodiment of the present invention includes the following steps:
s1, inputting an operator ID number and a password through a mobile phone APP to log in the initiator, and uploading identity information of the initiator to a cloud server;
s2, combining the operation password, the digital detonator UID code, the digital detonator shell code and the detonation password into a working code, and checking the working code with an authorization code, wherein if the checking is wrong, detonation cannot be carried out;
and S3, after the data are checked to be correct, the mobile phone APP sends an authorization file to the exploder, the digital detonator is charged, after the online networking nondestructive testing of the digital detonator is correct, the digital detonator is broadcasted and detonated, the electronic switch is disconnected from the physical bus connection, and the blasting record is generated and uploaded to the cloud server.
Wherein the initiator processor is a stm32 microprocessor, and uses freertos real-time operating system and EMWIN graphical operating interface. The detonator is provided with a Bluetooth communication module, a liquid crystal display, a matrix keyboard 6, a memory, a lithium battery management module, a bar code scanner, a GPS Beidou positioning module, a 485 networking module, a CAN networking module and other functional modules. And the microprocessor of the initiator is modulated and communicated through a bus and is connected with 500 detonators at most, and each detonator is sequenced according to the numbers 001 and 002-500. The specific operation process is as follows: the mobile phone APP collects identity card information of an initiator and conducts face recognition, the initiator synthesizes an operation code, a digital detonator UID (user identification) tube shell code and an initiation code into a working code, and the working code is checked with an authorization code. Charging a digital detonator, carrying out online networking nondestructive detection on the digital detonator, checking a detonation password, carrying out broadcast detonation, disconnecting a physical bus connection by an electronic switch, and generating and uploading a detonation record to a cloud server.
By setting multiple technical measures, the safe detonation of the digital detonator is ensured. The method comprises the steps of generating detailed detonation information records and uploading the information of the password function of the APP end of the mobile phone, face recognition, GPS positioning detonation judgment, Bluetooth communication judgment, three-code-in-one working code weight judgment, authorization file judgment, digital detonator single shot detection, digital detonator networking and digital detonator detonation control.
Preferably, the S1 specifically includes: the ID number and the password of an operator are input through the mobile phone APP to log in the initiator, the mobile phone APP collects identity card information of the initiator and conducts face recognition, the identity information of the initiator is uploaded to the cloud server, the identity information comprises the identity card information, face recognition information and a contact mode, and if any one of the identity information is not matched, detonation cannot be conducted. An operator remotely logs in the initiator through the mobile phone APP, inputs the ID and the password, and if the ID and the password are input incorrectly, the initiator cannot log in and cannot be detonated. And after logging in, carrying out face recognition, and if the face recognition fails, the detonation cannot be carried out.
Preferably, S2 specifically includes: calling a GPS (global positioning system) of the mobile phone, and when a GPS positioning module of the detonator is not in a detonation-allowed area, detonating cannot be carried out; calling a GPS (global positioning system) of the mobile phone, and when a GPS positioning module of the detonator is in a detonation forbidden area, detonating cannot be carried out; the mobile phone Bluetooth is not connected with the detonator, so the mobile phone cannot detonate. Under the conditions, the detonation cannot be carried out when any one of the conditions is not met, and sufficient safety is ensured.
The detonator detects the integrity of the system parameters of each on-line digital detonator, the operation ID and the operation password of a detonator are checked, and whether the detonation time and the detonation area are correct or not is judged by combining a GPS (global positioning system) positioning module of the detonator.
In a further aspect, step S2 further includes: and extracting key information of the detonation date, the detonation position and the detonation password from the authorization code, comparing the key information with the detonation position and the detonation password, and informing the detonator to allow detonation after the comparison is successful. After the mobile phone and the detonator are communicated through Bluetooth connection, the mobile phone APP can send an authorization file to the detonator, and the detonator receives the authorization file, extracts the detonation password of each detonator and stores the detonation password.
Preferably, the step S2 of synthesizing the work code specifically includes: the UID code of the digital detonator is coded into 13-bit bytes, the shell code of the digital detonator is coded into 13-bit bytes, the detonation password is coded into 8-bit bytes, the three codes are bound, and the SAM card key is used for forming a working code without human intervention and automatic encryption.
Preferably, before the broadcasting of the detonation in S3, the method further includes the following steps:
1) and sending a mode switching instruction to switch to the registration mode (only once).
2) And only connecting a single detonator leg wire, and sending a bus power supply instruction, wherein the voltage of the bus AB is 12V.
3) And (3) waiting for 100ms after power supply, sending a detonator configuration information acquisition instruction, acquiring the UID length, the detonation password length and the version information used by the detonator, and performing error prompt when the read configuration information does not meet the requirements, and ending the process.
4) And sending a scanning instruction, acquiring the UID, the state information and the like of the detonator, recording the UID in the detonator, and checking whether the state information is correct. The status information bits are illustrated in the fourth section 'scan' instruction.
5) And sending a command for writing a delay value and a hole site value, using UID for addressing, and writing the delay value and the hole site value of the detonator (optionally, if the current step is not used, writing in the field networking process is required).
6) And sending a read delay value and hole position value instruction, reading the previously written value and confirming that the writing is successful (optional).
7) And sending a bus power-off instruction.
In a preferred scheme, the digital detonator online networking in S3 specifically includes:
1) networking, connecting the bus, sending a mode switching instruction, and setting the mode of the module to be the networking mode (only once). The bus is continuously powered at 16V at this time.
2) And after the bus is powered for a period of time, sending 3 discharging instructions (with an interval of at least 10ms), and sending 3 detonator initialization instructions (with an interval of at least 500ms), wherein the instructions have certain requirements on the driving capability of a battery of the detonator.
3) And sending a command for acquiring detonator configuration information, and acquiring the UID length, the detonation password length and the version information used by the detonator. When the version detection is failed, the module does not receive other instructions except bus power supply/power off in the fourth section, voltage and current are obtained, mode switching is carried out, detonator configuration information is obtained, discharging is carried out, a detonator is reset, a detonator is initialized, bridge wire on-off is measured, and an energy storage capacitor is measured.
4) And sending commands of writing delay values and hole position values, writing the delay values and the hole position values one by one according to the UID registered by scanning codes, and paying attention to writing EE time to the detonator (waiting for 120ms after the last command is sent). When code scanning registration is used, the user needs to do the registration; when using a wired-in registration, this step may be omitted if the delay value and the hole site value have already been written at the time of registration.
5) And sending a command for clearing the UID read state, continuously sending scanning commands until all the detonators in the network are scanned out or the data are all 0 continuously returned for 10 times, determining that all the registered detonators are in the network and have no disconnection, and detecting the state bit information of each detonator. The status bit information for the initial detonator should be 0x00, the status bit indicating the fourth section 'scan' instruction. And if the delay value and the hole bit value obtained by detonator scanning do not accord with the values written in the step 4, the step 4 should be executed again for the non-conforming detonators, and then the step 5 should be executed again for all detonators.
6) If the detonator is not scanned or the detonator is not scanned, the delay value and the hole site value can be sent to confirm the state information of the detonator (if the corresponding delay value and the hole site value are read, the detonator is in the network, and if the delay value and the hole site value are not read, the detonator is not present). It is also possible to rescan (repeat step 5).
7) And sending a delay calibration instruction to perform broadcast delay calibration.
Following the initiation of the initiator, the method specifically comprises the following steps:
8) and sending a command of verifying the detonation passwords, and verifying the detonation passwords of all detonators. The detonation passwords of the detonators are different in principle, and all the detonation passwords need to be sent one by one. If the same initiation password is written in by all detonators when the three-code binding code is marked, only one time of sending is needed (different detonators are recommended to have exclusive unique initiation passwords, and the safety is improved).
9) And sending a command for clearing the UID read state, continuously sending scanning commands until all detonators in the network are scanned out or all data are 0 for 10 times continuously, determining that the current detonators are still all in the network and have no disconnection, and detecting the state bit information and the delay and hole site value information of each detonator. If the above steps are all correctly performed, the status bit information of the current detonator is 0x0C, and the status bits are different and can be correspondingly checked for errors, and the status information bits indicate the fourth section 'scan' instruction.
10) If no detonator is scanned or no detonator is scanned, the process is followed by step 6.
11) If the step 9 is correctly performed and the above steps are correctly performed, at this time, if a delay value and hole position value reading instruction is sent, the read detonator state bit information should be 0x 0D.
12) When the status bit scanned in step 9 indicates that the calibration is not successful, the delay time is confirmed, and then step 7 is executed again.
13) And when the status bit scanned in the step 9 shows that the verification of the detonation password is unsuccessful, confirming the detonation password, re-executing the step 8, and sending the detonation password corresponding to the detonator which is not verified.
14) And sending a read delay value and hole position value instruction according to the detonators UID with all state bit errors. And reading the state bits of the detonators again, and if the state bits are still wrong, sending a discharging instruction for 3 times and sending a detonator resetting instruction for 3 times. Removing the detonator with the problem, and then carrying out networking detonation flow again.
15) Sending a charging-22 v instruction, charging at high voltage, preparing for detonation, and paying attention to the charging time which is in a direct proportion trend with the number of the detonators, wherein the specific time refers to the charging instruction in section 4.
16) And sending a verification and detonation instruction, verifying the states of all detonators, entering a detonation delay if the states of all detonators are normal, and detonating when the delay time is reached.
As shown in fig. 2, an embodiment of the present invention further provides a digital detonator priming control system for improving security, where the system is used to implement the steps of the digital detonator priming control method for improving security, and the method includes:
the method comprises the steps that an APP inputs an ID number and a password of an operator to log in an initiator through the APP, and identity information of the initiator is uploaded to a cloud server; combining the operation password, the digital detonator UID code, the digital detonator shell code and the initiation password into a working code, and checking the working code with an authorization code, wherein if the working code is checked to be wrong, initiation cannot be carried out; after the error is checked, the APP sends an authorization file to the detonator;
the server is used for recording detonation time, UID (user identifier) codes, longitude and latitude, information of blasting operators, information of detonated articles and counting information after detonation;
and the primer is used for charging the digital detonator after the online networking nondestructive testing of the digital detonator is correct, the primer detonates, and the electronic switch is disconnected with the physical bus connection.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing description of specific exemplary embodiments of the invention has been presented for the purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain certain principles of the invention and its practical application to enable one skilled in the art to make and use various exemplary embodiments of the invention and various alternatives and modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.

Claims (10)

1. A digital detonator detonation control method for improving safety is characterized by comprising the following steps:
s1, inputting an operator ID number and a password through the APP to log in the initiator, and uploading identity information of the initiator to a cloud server;
s2, combining the detonation password, the digital detonator UID code and the digital detonator shell code into a working code, and checking the working code with an authorization code, wherein if the working code is checked to be wrong, the detonation cannot be carried out;
s3, after the verification is correct, the APP sends an authorization file to the detonator, after the online networking nondestructive testing of the digital detonator is correct, the digital detonator is charged, the detonator is detonated, and the electronic switch is disconnected with the physical bus connection;
and S4, finishing detonation, recording detonation time, UID (user identification) code, longitude and latitude, information of blasting operators, information of blasted articles and counting information after blasting to form blasting record information and uploading the blasting record information to a cloud server.
2. The method for controlling initiation of the digital detonator according to claim 1, wherein the step S1 specifically comprises: the ID number and the password of an operator are input through the mobile phone APP to log in the initiator, the mobile phone APP collects identity card information of the initiator and conducts face recognition, the identity information of the initiator is uploaded to the cloud server, the identity information comprises the identity card information, face recognition information and a contact mode, and if any one of the identity information is not matched, detonation cannot be conducted.
3. The method for controlling initiation of the digital detonator according to claim 1, wherein the step S2 specifically comprises:
calling a GPS (global positioning system) of the mobile phone, and when a GPS positioning module of the detonator is not in a detonation-allowed area, detonating cannot be carried out;
calling a GPS (global positioning system) of the mobile phone, and when a GPS positioning module of the detonator is in a detonation forbidden area, detonating cannot be carried out;
the mobile phone Bluetooth is not connected with the detonator, so the mobile phone cannot detonate.
4. The method for controlling detonation of a digital detonator with improved safety according to claim 1, wherein the step S2 further comprises: and extracting key information of the detonation date, the detonation position and the detonation password from the authorization code, comparing the key information with the detonation position and the detonation password, and informing the detonator to allow detonation after the comparison is successful.
5. The method for controlling initiation of the digital detonator according to claim 1, wherein the step of synthesizing the working code in the step S2 specifically comprises the steps of: the UID code of the digital detonator is coded into 13-bit bytes, the shell code of the digital detonator is coded into 13-bit bytes, the detonation password is coded into 8-bit bytes, the detonation password, the UID code of the digital detonator and the shell code of the digital detonator are bound, and the SAM card secret key is used for forming a working code without human intervention and automatic encryption.
6. The method for controlling initiation of the digital detonator according to claim 1, wherein the step S3 specifically comprises: the mobile phone is communicated with the detonator through Bluetooth, and the detonator receives the authorization file, extracts and stores the detonation password of each detonator.
7. The method for controlling detonation of the digital detonator with improved safety according to claim 1, wherein the method further comprises the following steps before the broadcast detonation in the step S3:
1) sending a mode switching instruction, and switching to a registration mode;
2) only connecting a single detonator leg wire, and sending a bus power supply instruction, wherein the voltage of the bus AB is 12V;
3) waiting for 100ms after power supply, sending a detonator configuration information acquisition instruction, acquiring the UID length, the detonation password length and the version information used by the detonator, and performing error prompt when the read configuration information does not meet the requirements, and ending the process;
4) sending a scanning instruction, acquiring the UID and the state information of the detonator, recording the UID in the detonator, and checking whether the state information is correct or not;
5) sending a command for writing a delay value and a hole site value, using UID (user identification) for addressing, and writing the delay value and the hole site value of the detonator;
6) sending a read delay value and hole position value instruction, reading out the corresponding values written in the previous step, and confirming that the writing is successful;
7) and sending a bus power-off instruction.
8. The method for controlling initiation of a digital detonator, which is used for improving the safety, according to claim 1, wherein the digital detonator online networking in the step S3 specifically comprises the following steps:
1) connecting a bus, sending a mode switching instruction, setting the mode of the module to be a networking mode, and continuously supplying power for the bus by 16V at the moment;
2) the bus supplies power for a period of time, then sends a discharging instruction for 3 times, and the interval is at least 10 ms; sending a detonator initialization command for 3 times at least 500 ms;
3) sending a command for acquiring detonator configuration information, and acquiring UID length, detonation code length and version information used by the detonator;
4) sending a command of writing the delay value and the hole site value, and writing the delay value and the hole site value one by one according to the UID registered by scanning the code;
5) sending an instruction for clearing the UID read state, continuously sending scanning instructions until all the detonators in the network are scanned out or the data are all 0 in 10 times continuously, determining that all the registered detonators are in the network and the condition of no disconnection exists, and detecting the state bit information of each detonator;
the status bit information of the initial detonator is 0x00, if the delay value and the hole bit value obtained by detonator scanning do not accord with the value written in the step 4), the step 4) should be executed again for the non-conforming detonators, and then the step 5) is executed again for all the detonators);
6) if the detonator is not scanned or the unregistered detonator is scanned, transmitting a delay value and a hole site value instruction roll call to confirm the state information of the detonator, or repeatedly executing the step 5);
7) and sending a delay calibration instruction to perform broadcast delay calibration.
9. The safety-improved digital detonator initiation control method according to claim 1, wherein the step of initiating the detonator in S3 comprises the steps of:
a) sending a command for verifying the detonation passwords and verifying the detonation passwords of all detonators;
b) sending a command for clearing the UID read state, then continuously sending scanning commands until all detonators in the network are scanned out or all data are 0 for 10 times continuously, determining that the current detonators are still all in the network and have no disconnection, and detecting state bit information and delay and hole site value information of each detonator;
c) if the detonator is not scanned or the detonator is scanned to be unregistered, transmitting a delay value and a hole site value instruction roll call to confirm the state information of the detonator or rescanning;
d) if the step b is correctly carried out and the steps are all correctly carried out, if a delay value and hole position value reading command is sent, the detonator state bit information is read to be 0x 0D;
e) when the status bit scanned in the step b shows that the calibration is unsuccessful, determining delay time, then sending a delay calibration instruction, and broadcasting delay calibration;
f) when the status bit scanned in the step b shows that the verification of the detonation password is unsuccessful, confirming the detonation password, re-executing the step a, and sending the detonation password corresponding to the detonator which is not verified;
g) and sending the instructions of the read delay value and the hole position value according to the detonators UIDs with all state bit errors. Reading the status bits of the detonators again, if the status bits are still wrong, sending a discharging instruction for 3 times, and sending a detonator resetting instruction for 3 times; removing the detonator with the problem, and then performing networking detonation flow again;
h) sending a charging 22v instruction, charging at high voltage and preparing for detonation;
i) and sending a verification and detonation instruction, verifying the states of all detonators, entering a detonation delay if the states of all detonators are normal, and detonating when the delay time is reached.
10. A safety-improved digital detonator initiation control system, which is used for realizing the safety-improved digital detonator initiation control method according to any one of claims 1 to 9, and comprises the following steps:
the method comprises the steps that an APP inputs an ID number and a password of an operator to log in an initiator through the APP, and identity information of the initiator is uploaded to a cloud server; combining the operation password, the digital detonator UID code, the digital detonator shell code and the initiation password into a working code, and checking the working code with an authorization code, wherein if the working code is checked to be wrong, initiation cannot be carried out; after the error is checked, the APP sends an authorization file to the detonator;
the server is used for recording detonation time, UID (user identification) codes, longitude and latitude, information of blasting operators, information of detonation articles and counting information after detonation;
and the primer is used for charging the digital detonator after the online networking nondestructive testing of the digital detonator is correct, the primer detonates, and the electronic switch is disconnected with the physical bus connection.
CN202210490824.6A 2022-05-07 2022-05-07 Digital detonator initiation control method and system for improving safety Active CN114646243B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210490824.6A CN114646243B (en) 2022-05-07 2022-05-07 Digital detonator initiation control method and system for improving safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210490824.6A CN114646243B (en) 2022-05-07 2022-05-07 Digital detonator initiation control method and system for improving safety

Publications (2)

Publication Number Publication Date
CN114646243A true CN114646243A (en) 2022-06-21
CN114646243B CN114646243B (en) 2023-06-23

Family

ID=81997660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210490824.6A Active CN114646243B (en) 2022-05-07 2022-05-07 Digital detonator initiation control method and system for improving safety

Country Status (1)

Country Link
CN (1) CN114646243B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115063026A (en) * 2022-07-11 2022-09-16 无锡盛景微电子股份有限公司 Civil explosion service cloud platform system
CN115164658A (en) * 2022-07-08 2022-10-11 融硅思创(北京)科技有限公司 Automatic on-line system and communication method for digital electronic detonator
CN115247983A (en) * 2022-09-22 2022-10-28 上海芯飏科技有限公司 Method and system for adaptively adjusting communication parameters
CN115297084A (en) * 2022-08-04 2022-11-04 上海芯跳科技有限公司 Method and system for improving communication efficiency of electronic detonator
CN115479511A (en) * 2022-08-10 2022-12-16 上海芯跳科技有限公司 Method and system for online detection of electronic detonator networking
CN117910983A (en) * 2024-03-19 2024-04-19 太原新欣微电科技有限公司 Electronic detonator detonation safety real-time detection and evaluation system based on data analysis

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0434883A1 (en) * 1989-12-29 1991-07-03 Union Espanola De Explosivos S.A. Electronic detonators-exploder system for high-reliable stepped detonation
AU2004256470A1 (en) * 2003-07-15 2005-01-20 Detnet South Africa (Pty) Ltd Blasting system and programming of detonators
CN101666600A (en) * 2009-09-29 2010-03-10 北京维深数码科技有限公司 Novel digital electronic detonator initiator and control method thereof
CN101666598A (en) * 2009-09-24 2010-03-10 北京维深数码科技有限公司 Digital electronic detonator blasting system and control method thereof
CN103115536A (en) * 2013-02-08 2013-05-22 前进民爆股份有限公司 Digital electronic detonator large-scale priming system for engineering blasting and method thereof
CN202974054U (en) * 2012-11-21 2013-06-05 浙江宝业建筑智能科技有限公司 Remote detonation control system
FR3013827A1 (en) * 2013-11-28 2015-05-29 Davey Bickford ELECTRONIC DETONATOR
CN105283731A (en) * 2014-01-21 2016-01-27 北京丹芯灵创科技有限公司 Electronic detonator blasting management system and blasting construction method
CN106017239A (en) * 2016-07-22 2016-10-12 中国葛洲坝集团易普力股份有限公司 High-safety electronic detonator initiation system and method thereof
CN107246828A (en) * 2017-08-02 2017-10-13 中国葛洲坝集团易普力股份有限公司 A kind of electric detonator networking structure and control method
WO2018033881A1 (en) * 2016-08-19 2018-02-22 Pavuluri Bharath Electronic detonator-exploder system
CN108253855A (en) * 2018-03-09 2018-07-06 成都友创芯达电子科技有限公司 It is a kind of that there is the control device for detonation of electric detonator of management and control and management-control method
CN109696097A (en) * 2019-02-16 2019-04-30 华夏世昌(北京)科技有限公司 Digital electric detonator chip and control method based on dual-wire bus
CN109764779A (en) * 2019-02-06 2019-05-17 华夏世昌(北京)科技有限公司 Digital electric detonator initiation system and method based on dual-wire bus
CN110044224A (en) * 2019-03-28 2019-07-23 陈默 A kind of electric detonator and its initiation system of no ignition capacitor
CN110823029A (en) * 2019-09-10 2020-02-21 贵州全安密灵科技有限公司 Separated detonation control system and detonation control method
CN111811327A (en) * 2020-07-29 2020-10-23 无锡盛景电子科技有限公司 Universal detonation control platform and detonation control method
CN114111486A (en) * 2021-11-29 2022-03-01 无锡盛景微电子股份有限公司 Electronic detonator initiation device and working method thereof

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0434883A1 (en) * 1989-12-29 1991-07-03 Union Espanola De Explosivos S.A. Electronic detonators-exploder system for high-reliable stepped detonation
AU2004256470A1 (en) * 2003-07-15 2005-01-20 Detnet South Africa (Pty) Ltd Blasting system and programming of detonators
CN101666598A (en) * 2009-09-24 2010-03-10 北京维深数码科技有限公司 Digital electronic detonator blasting system and control method thereof
CN101666600A (en) * 2009-09-29 2010-03-10 北京维深数码科技有限公司 Novel digital electronic detonator initiator and control method thereof
CN202974054U (en) * 2012-11-21 2013-06-05 浙江宝业建筑智能科技有限公司 Remote detonation control system
CN103115536A (en) * 2013-02-08 2013-05-22 前进民爆股份有限公司 Digital electronic detonator large-scale priming system for engineering blasting and method thereof
FR3013827A1 (en) * 2013-11-28 2015-05-29 Davey Bickford ELECTRONIC DETONATOR
CN105283731A (en) * 2014-01-21 2016-01-27 北京丹芯灵创科技有限公司 Electronic detonator blasting management system and blasting construction method
CN106017239A (en) * 2016-07-22 2016-10-12 中国葛洲坝集团易普力股份有限公司 High-safety electronic detonator initiation system and method thereof
WO2018033881A1 (en) * 2016-08-19 2018-02-22 Pavuluri Bharath Electronic detonator-exploder system
CN107246828A (en) * 2017-08-02 2017-10-13 中国葛洲坝集团易普力股份有限公司 A kind of electric detonator networking structure and control method
CN108253855A (en) * 2018-03-09 2018-07-06 成都友创芯达电子科技有限公司 It is a kind of that there is the control device for detonation of electric detonator of management and control and management-control method
CN109764779A (en) * 2019-02-06 2019-05-17 华夏世昌(北京)科技有限公司 Digital electric detonator initiation system and method based on dual-wire bus
CN109696097A (en) * 2019-02-16 2019-04-30 华夏世昌(北京)科技有限公司 Digital electric detonator chip and control method based on dual-wire bus
CN110044224A (en) * 2019-03-28 2019-07-23 陈默 A kind of electric detonator and its initiation system of no ignition capacitor
CN110823029A (en) * 2019-09-10 2020-02-21 贵州全安密灵科技有限公司 Separated detonation control system and detonation control method
CN111811327A (en) * 2020-07-29 2020-10-23 无锡盛景电子科技有限公司 Universal detonation control platform and detonation control method
CN114111486A (en) * 2021-11-29 2022-03-01 无锡盛景微电子股份有限公司 Electronic detonator initiation device and working method thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张念念;郑志琴;杨阳;: "数码电子雷管及其起爆系统的安全性能分析", 河南科学, no. 12 *
钱熊飞等: "工业电子雷管信息管理通则", pages 4 - 5, Retrieved from the Internet <URL:https://gcbz.org/content/GA%201531-2018%20工业电子雷管信息管理通则> *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115164658A (en) * 2022-07-08 2022-10-11 融硅思创(北京)科技有限公司 Automatic on-line system and communication method for digital electronic detonator
CN115164658B (en) * 2022-07-08 2023-09-19 融硅思创(北京)科技有限公司 Automatic digital electronic detonator online system and communication method
CN115063026A (en) * 2022-07-11 2022-09-16 无锡盛景微电子股份有限公司 Civil explosion service cloud platform system
CN115297084A (en) * 2022-08-04 2022-11-04 上海芯跳科技有限公司 Method and system for improving communication efficiency of electronic detonator
CN115297084B (en) * 2022-08-04 2023-11-28 上海芯跳科技有限公司 Method and system for improving communication efficiency of electronic detonator
CN115479511A (en) * 2022-08-10 2022-12-16 上海芯跳科技有限公司 Method and system for online detection of electronic detonator networking
CN115479511B (en) * 2022-08-10 2023-10-27 上海芯跳科技有限公司 Method and system for online detection of electronic detonator networking
CN115247983A (en) * 2022-09-22 2022-10-28 上海芯飏科技有限公司 Method and system for adaptively adjusting communication parameters
CN115247983B (en) * 2022-09-22 2022-12-20 上海芯飏科技有限公司 Method and system for adaptively adjusting communication parameters
CN117910983A (en) * 2024-03-19 2024-04-19 太原新欣微电科技有限公司 Electronic detonator detonation safety real-time detection and evaluation system based on data analysis
CN117910983B (en) * 2024-03-19 2024-06-04 太原新欣微电科技有限公司 Electronic detonator detonation safety real-time detection and evaluation system based on data analysis

Also Published As

Publication number Publication date
CN114646243B (en) 2023-06-23

Similar Documents

Publication Publication Date Title
CN114646243B (en) Digital detonator initiation control method and system for improving safety
CN108253855B (en) Electronic detonator detonation control device with control function and control method
CN109764779B (en) Digital electronic detonator detonation system and method based on double-wire bus
US9091518B2 (en) Apparatus and method for blasting
CN101666600B (en) Novel digital electronic detonator initiator and control method thereof
CN101349532B (en) Safe blasting system capable of alarming misfire information
CN110823029A (en) Separated detonation control system and detonation control method
CN201269721Y (en) Apparatus for alarming misfire information of blasting equipment
CN201527238U (en) Novel digital electronic detonator initiator
CN114111486B (en) Electronic detonator initiation device and working method thereof
EP1855077A2 (en) Blasting methods and apparatus with reduced risk of inadvertent or illicit use
CN110243240A (en) A kind of electronic detonator initiator by Beidou and UID code constrained and time
CN106017239A (en) High-safety electronic detonator initiation system and method thereof
CN113028917A (en) Time-adjustable electronic detonator control method and device and storage medium
CN108827095B (en) Control system of wireless detonator
CN112985205A (en) Terminal for supervision work of electronic detonator initiator
CN111193799B (en) Rocket projectile safe launching control system and control method
CN111998744B (en) Detonation method, device and system for gas electronic excitation tube
CN118623717A (en) Digital electronic detonator priming system and method based on magnetic induction through-the-earth communication
CN114120619A (en) Apparatus for detecting matching relation of radio remote control device and method thereof
ZA200804158B (en) Blasting methods and apparatuus with reduced risk of inadvertent or illicit use

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant