EP1709387A1 - Systeme de mise a feu a distance - Google Patents

Systeme de mise a feu a distance

Info

Publication number
EP1709387A1
EP1709387A1 EP05722462A EP05722462A EP1709387A1 EP 1709387 A1 EP1709387 A1 EP 1709387A1 EP 05722462 A EP05722462 A EP 05722462A EP 05722462 A EP05722462 A EP 05722462A EP 1709387 A1 EP1709387 A1 EP 1709387A1
Authority
EP
European Patent Office
Prior art keywords
remote
controller device
subset
remote devices
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05722462A
Other languages
German (de)
English (en)
Inventor
Thomas Lee Jacobson
Neil H. Rothenbuhler
Richard B. Taft
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rothenbuhler Engineering Co
Original Assignee
Rothenbuhler Engineering Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rothenbuhler Engineering Co filed Critical Rothenbuhler Engineering Co
Publication of EP1709387A1 publication Critical patent/EP1709387A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42DBLASTING
    • F42D1/00Blasting methods or apparatus, e.g. loading or tamping
    • F42D1/04Arrangements for ignition
    • F42D1/045Arrangements for electric ignition
    • F42D1/05Electric circuits for blasting
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42DBLASTING
    • F42D1/00Blasting methods or apparatus, e.g. loading or tamping
    • F42D1/04Arrangements for ignition
    • F42D1/045Arrangements for electric ignition
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42DBLASTING
    • F42D1/00Blasting methods or apparatus, e.g. loading or tamping
    • F42D1/04Arrangements for ignition
    • F42D1/045Arrangements for electric ignition
    • F42D1/05Electric circuits for blasting
    • F42D1/055Electric circuits for blasting specially adapted for firing multiple charges with a time delay

Definitions

  • FIGURE 1 A depicts a plan view of an open pit mine 100.
  • Three separate groups of explosives 118 A-C are situated in various locations throughout the mine. Each shot 118 A-C is tethered to a blasting machine (not pictured) and operator 116 A-C by a lead line 126 A-C. This allows the operator 116 A-C to initiate a blasting sequence, transmitting a signal with a blasting machine through the lead line 126 A-C to the detonators in the shot 118 A-C.
  • a danger area 124 A-C is associated with loose rock, known as fly rock, which can be thrown to great distances by the explosive force released upon detonation of the shot 118 A-C.
  • the blasting machine and operator 116 A-C must be located outside of the danger area 124 A-C created by the explosion.
  • vehicles 114 A-C and other mine employees 112 A-B must also be located outside of the danger area 124 A-C of each shot 118 A-C.
  • Mine personnel (not shown), known as spotters, guard areas of ingress that cannot be observed by the blasting machine operator, preventing other mineworkers or equipment from entering the danger area 124 A-C during a shot.
  • overlapping danger areas 124 A-C from each shot 118 A-C can create significant portions of a mine that pose a risk to both vehicles 114 A-C and mine personnel 112 A-B when blasting ensues.
  • FIGURE 1A further illustrates the typical one to one relationship of shot 118 A-C to blasting machine and operator 116 A-C.
  • FIGURE IB depicts a cross-sectional view of a subterranean mine 150.
  • blasting machines and lead lines can be used to detonate explosives in a subterranean mine. Shots are placed in headings 156 A-D of working shafts 154 A-D. These working shafts 154 A-D connect to the main shaft 152. The main shaft 152 leads to the surface. Due to the dangers of cave-ins for subterranean mining, entire mines are generally shut down and evacuated prior to detonation of explosives.
  • Subterranean mines can have multiple headings 156 A-D, each of which may, or may not, have a shot placed in it. As in the surface mining example (FIGURE 1A) this adds complexity to firing shots, as each individual shot requires a distinct lead line and blasting machine. Ideally, the operator would FIRE the shot from the surface to avoid a possible cave-in. However, in large mines this might require unreasonably long or expensive lead lines.
  • FIGURE 1C depicts a remote control blasting machine system 180.
  • An operator 196 manipulates a controller device 184, transmitting a signal 186 to a remote device 182.
  • the remote device 182 is coupled to a shortened lead line 198.
  • the shortened lead line 198 is coupled to a detonator line 194 which is coupled to a detonator 192 placed in a main explosive charge 188.
  • FIGURE 1C further illustrates a communication that includes commands transmitted from a controller device 184 and received by a remote device 182 (illustrated by an arrow 186).
  • the remote device 182 affirms a received signal, but provides no additional information beyond this affirmation.
  • An additional safety and efficiency concern of remote control blasting machines is associated with deployment of the remote device 182.
  • Information sent using radio frequencies is the typical method for communication between a controller device 184 and a remote device 182.
  • Topographical features or atmospheric conditions can attenuate effective radio frequency communication range. This attenuation can result in ineffective placement of a remote device 182 or controller device 184 and create uncertainty in a blasting sequence, thereby reducing safety and efficiency. If weather changes or the movement of equipment at a mine disrupt communication, a shot may not fire, leaving an unexpected live explosive charge in the field where workers will be returning. This is a significant disadvantage associated with remote control blasting machines and is especially troublesome in subterranean mines 150 where electromagnetic attenuation is a more significant problem than in surface mining 100.
  • a remote firing system, a controller device, a remote device, and a method for remotely detonating explosives is provided.
  • the system form of the invention includes a remote firing system that comprises a set of remote devices.
  • Each remote device is capable of communicating a safety data structure that contains a system identifier for identifying the remote firing system from other remote firing systems and a device identifier for identifying a remote device from other remote devices.
  • the remote firing system further includes a controller device for causing the set of remote devices to trigger detonators.
  • the controller device is capable of selecting a subset of the set of remote devices for triggering detonators and further being capable of communicating the safety data structure that contains a system identifier for identifying the remote firing system from other remote firing systems and device identifiers for identifying the subset of remote devices to control.
  • a device form of the invention includes a controller device that includes a set of selection and information panels that correspond with a set of remote devices. A subset of selection and information panels is selectable to cause a corresponding subset of remote devices to be selected for detonating explosives.
  • the controller device further includes a communication module for transmitting and receiving safety communication. The communication module is capable of communicating with the subset of remote devices to indicate their selection for detonating explosives by the controller device.
  • a device form of the invention includes a remote device that includes a communication module for transmitting and receiving a safety data structure that contains a system identifier for identifying a remote firing system that comprises the remote device and a device identifier for identifying the remote device.
  • the remote device further includes a switch for selecting either shock-tube detonator initiation or electric detonator initiation.
  • a method form of the invention includes a method for remotely detonating explosives. The method includes selecting a subset of a set of selection and information panels on a controller device to cause a corresponding subset of remote devices to be selected for detonating explosives.
  • the method further includes issuing an arming command by the controller device to the subset of remote devices to cause the subset of remote devices to prepare for detonation.
  • the method yet further includes issuing a firing command by the controller device to the subset of remote devices by simultaneously selecting dual fire switches together on the controller device to cause the subset of remote devices to detonate explosives.
  • FIGURE 1A is a pictorial diagram showing a plan view of an open pit surface mine, wherein conventional blasting techniques are employed;
  • FIGURE IB is a pictorial diagram showing a cross-sectional illustration of a subterranean mining operation;
  • FIGURE 1C is a pictorial diagram illustrating a remote control blasting machine with conventional communication capability;
  • FIGURE 2A is a pictorial diagram illustrating a remote firing system using safety communication according to one embodiment of the present invention;
  • FIGURE 2B is a pictorial diagram illustrating multiple remote firing systems using safety communication between multiple remote devices and a single controller device in each remote firing system, according to one embodiment of the present invention;
  • FIGURE 3 A is a pictorial diagram of a controller device user interface, in accordance with one embodiment of the present invention;
  • FIGURE 2A illustrates the constituent parts of a remote firing system 200 that include a remote device 208 and a controller device 202 that interoperate to provide safety communication in accordance with one embodiment of the present invention.
  • the inputs 210 may include for example, user commands or safety interlock device signals.
  • the remote device 208 is coupled to a lead line 212 to transmit a signal that initiates a detonator.
  • safety communication used hereinabove and hereinbelow means any suitable communication occurring between a remote device and a controller device that indicates that mteroperation is safe.
  • One suitable safety communication occurs when a safety data structure is transmitted from a first piece of equipment and received at a second piece of equipment and transmitted from the second piece of equipment and received by the first piece of equipment.
  • a safety data structure containing blasting information can be transmitted from the controller device 202 and received by the remote device 208, and another safety data structure containing blasting information can be transmitted from the remote device 208 and received by the controller device 202.
  • FIGURE 2B illustrates a remote firing system comprising multiple remote devices interoperating with a controller device using safety communication.
  • An electronic key is a device that provides the means of gaining or preventing control of another device electronically, mechano-electronically, opto-electronically, or some combination thereof.
  • information contained on the electronic key is preferably electronically accessible by the piece of equipment.
  • This information provides various suitable identifications, such as, whether the electronic key permits access to a controller device or a remote device; programming level access to a remote device; identification of a unique remote firing system; and an index identifying the last programming event for that particular electronic key.
  • the electronic keys 230, 232, 246, 248, and 250 provide one or more suitable pieces of identification information. For example, three pieces of suitable identification information delimited by colons: DEVICE:SYSTEM:INDEX. Preceding the first delimiter is the device identifier. After the first and before the second delimiter is the system identifier.
  • a string of 0:A:T1 represents a controller device identified as 0, on remote firing system A, last programmed with index TI .
  • the device identifier, coded on an electronic key increases the safety of operating multiple remote devices through a single controller device.
  • the controller device 226 or 228 is used preferably to operate one to eight remote devices, although less or more remote devices are possible.
  • remote devices are non-operational when a controller device electronic key is coupled to the remote devices.
  • the controller device operates preferably in a programming mode when a remote device electronic key is coupled to the controller device if the controller is in key programming mode.
  • the devices When a remote device is coupled to a compatible remote device electronic key or when a controller device is coupled to a compatible controller device electronic key, the devices preferably operate normally.
  • the controller electronic keys 230 and 232 include the device identifier O and identify controller devices 226 and 228.
  • the remote electronic keys 246, 248, and 250 include the identifiers X and Z.
  • the remote firing system identifier serves to increase the safety of concurrent operation of multiple remote firing systems 220.
  • Each remote firing system 222 and 224 is designated by a unique identifier such as A and B. (See electronic keys 230 and 232.)
  • the system identifier includes the serial number of the controller device.
  • Remote devices coupled to remote device electronic keys with suitable system identifiers and indexed identifiers function normally. Remote devices coupled to remote device electronic keys preferably discard a transmission received from a controller device on a different system with different system identifiers.
  • the safety communication of system A (illustrated by arrows 252, 234, 236, and 254) occurs among the system A controller and compatible remote devices, and system B safety communication (illustrated by arrows 238 and 256) occurs among the system B controller and compatible remote devices.
  • the controller device preferably operates with a controller device electronic key containing the same system identifier as stored internally on the controller device.
  • the indexed identifier information stored on an electronic key represents the most recent programming event of the electronic key.
  • the identifier is indexed and updated on the electronic key and stored internally on the controller device. This prevents more than one remote firing system device electronic key from carrying identifier information that is identical (same device identifier, same system identifier, and same indexed identifier) as another electronic key. For example, if a first electronic key is programmed to 4:A:T1, an attempt to program a second electronic key with the same identifiers will result in the index identifier being incremented. The identification information that would be stored on the second electronic key is 4:A:T2. Any suitable incrementing process can be used, such as time stamping.
  • the electronic key with the most recent indexed identifier preferably allows a remote device to function while the electronic key with the older indexed identifier will not allow the device to function, despite both keys otherwise identifying the same device and system identifiers.
  • Electronic keys with the same device identifier and indexed identifier are possible, but preferably exist on different systems, by design, maintaining the robust nature of the unique electronic key scheme. For example, if the first electronic key is 4:A:T2, a second key, with an identical device identifier and indexed identifier, 4 and T2, preferably be programmed on system B (more precisely, the system identifier can be programmed on any system other than system A) yielding 4:B:T2.
  • each electronic key contains a unique set of identifiers distinguishing a controller or remote device, a remote firing system, and the most recent set of programming. This creates an additional level of safety by creating unique electronic keys and preventing multiple, unintended detonations that could otherwise result if duplicate electronic keys were present in a remote firing system.
  • electronic key identification information is transmitted as a component of the safety data structure for a transmission by a piece of remote firing system equipment.
  • a received safety data structure is parsed and the extracted identification information is compared to the information stored on an electronic key coupled to the receiving piece of equipment.
  • the arrows 234, 236, and 238 indicate selective data flow among controller devices and remote devices containing electronic keys with suitable system identifiers.
  • the arrows 234 and 236 represent data transmission from controller device 226 with a system identifier A and the indexed identifier TI.
  • Arrow 238 represents data transmission by controller device 228 with a system identifier B and index TI.
  • the transmission from controller device 226, if received by the remote device 242, is preferably discarded by remote device 242 because the system identifier is not compatible.
  • This same transmission from controller device 226, if received by the remote devices 240 and 244, is accepted because the system and indexed identifiers are compatible.
  • the transmission from controller device 228 is preferably accepted by remote device 242, while preferably being discarded by remote devices 240 and 244. Transmissions from the remote devices 240, 242, and 244 will preferably be discarded by controller devices 226 and 228 with uncompatible system identifiers.
  • the controller and remote devices preferably discard a received transmission.
  • remote devices discard transmissions that do not identify as originating from a controller device. This allows the operator to control, with a single controller device, multiple uniquely identified remote devices. Multiple remote firing systems can be deployed contemporaneously 220 because they are unlikely to conflict with one another due to different system identifiers.
  • the remote devices of the firing system can be semi-permanently assigned a device identity as an alternative to assuming the identity associated with the identification information stored on a coupled electronic key. This semi-permanent programming causes the remote device to function normally preferably with remote device electronic keys having a specified device identifier that suitably relates to the semi-permanently programmed device identifier stored internally on the remote device.
  • the semi-permanently programmed remote device will however preferably function normally (assuming a received transmission includes suitable identifiers) with any of the following electronic keys: 6:A:T1, 6:A:T5, 6:C:T1, 6:S:T9, for example. This is because they all have the same device identifier as the semi-permanently programmed system device identifier stored internally on the remote device.
  • the number 6 identifier programmed is preferably nonvolatile and persists until the device is reset to an unprograrnmed state or is semi-permanently programmed to a different device identity.
  • semi-permanent system device identity programming is achieved preferably through the use of a master electronic key.
  • FIGURE 3A illustrates an exemplary front panel for a controller device user interface 300 in accordance with one embodiment of the present invention.
  • Any suitable number of remote devices are controllable from the controller device user interface 300.
  • One suitable number of remote devices in accordance with one embodiment of the present invention, is eight remote devices.
  • the left portion of the controller device user interface 300 encompasses the selection and information panel 304 A-H for eight remote devices.
  • Each remote device panel 304 A-H includes a membrane switch 306 A-H that allows selection or deselection of the associated remote device.
  • each remote device panel 304 A-H includes labeling and an LED indicator for the READY state 308, ARMED state 310, battery condition 312, and selected state 314 of the associated remote device.
  • the right portion of the controller device user interface 300 includes a controller device interface, an informational interface, and a user input section interface.
  • the controller device interface includes an external antenna connection port 316, an electronic key interface 318, and a prograrnming port 320.
  • the informational interface includes the controller device battery status panel 322, including labeling and an LED indicator for slow charge 324, fast charge 326, 20% remaining battery capacity 328, 40% remaining battery capacity 330, 60% remaining battery capacity 332, 80% remaining battery capacity 334, and 100% remaining battery capacity 336. These percentages of remaining battery capacity are arbitrarily selected and other percentages, or different styles of display, can be substituted in other embodiments without departing materially from the present invention.
  • the informational interface includes a panel 338 containing labeling and indicator LEDs for the device power 340, electronic key status 342, device transmitting 344, and device receiving 346.
  • the user input selection interface comprises a panel 348 for placing a controller device in the ON state, the panel 348 including labeling and a membrane switch 350.
  • the user input selection interface further comprises a panel 352 for placing a controller device in the OFF state, the panel 352 including labeling and a membrane switch 354.
  • the user input selection interface further comprises a panel 356 for selecting a status query operation with a membrane switch 360, the panel 356 including labeling and an LED indicator 358.
  • the user input selection interface further comprises a panel 362 for placing the controller device battery status panel 322 in an ON or OFF state by cycling a membrane switch 366, the panel 362 including labeling and an LED indicator 364.
  • the user input selection interface further comprises a panel 368 for selecting an ARM command operation with a membrane switch 372, the panel 368 including labeling and an LED indicator 370.
  • the user input selection interface further comprises a panel 374 for selecting a DISARM command operation with a membrane switch 378, the panel 374 including labeling and an LED indicator 376.
  • the user input selection interface further comprises dual panels 380 and 386 for selecting a FIRE command operation with dual membrane switches 384 and 390, the panels 380 and 386 including labeling and LED indicators 382 and 388.
  • FIGURE 3 B illustrates an exemplary front panel for a remote device user interface 390.
  • the remote device user interface 390 includes indicator panels 392 and 398 for selection of a method for initiating a detonation.
  • the methods include shock-tube detonator initiation or electric detonator initiation, among others.
  • the shock-tube detonator initiation panel 392 includes labeling and LED indicators 394 and 396 for READY and ARMED status.
  • the electric detonator initiation panel 398 includes labeling and LED indicators 402 and 400 for READY and ARMED status.
  • a switch 404 selects an initiation method panel 392 or 398, and, in accordance with one embodiment of the present invention, is a mechanical toggle switch.
  • the remote device user interface 390 further includes a remote device battery status panel 406.
  • the panel 406 includes a switch 408, for activating a battery status display 410 such as a digital voltmeter for example, and in accordance with one embodiment of the present invention, is a mechanical momentary push button switch. Other types of suitable switches and battery status displays can be used.
  • a panel 412, for placing the remote device in an ON or OFF state, comprising a remote device power switch 414, labeling and an LED indicator 416 is included on the remote device user interface 390.
  • the remote device user interface 390 further comprises a battery charger panel 418 and an electronic key panel 426.
  • the battery charger panel 418 includes labeling and an indicator LED 420 for indicating connectivity to a battery charger. Two additional indicator LEDs 422 and 424 and labeling, indicating slow and fast charging rates, are included on the battery charger panel 418.
  • the electronic key panel 426 includes a connection port 428, to couple an electronic key; three LED indicators 430, 436, and 432; and labeling to indicate remote device transmission, electronic key status, and remote device receiving in accordance with the safety communication ability of various embodiments of the present invention.
  • the remote device user interface 390 further includes a port 438 for connecting an external antenna, and a programming port 440.
  • the remote device user interface 390 further includes a connection port 442 for connection of a lead line to the initiation circuitry. This port is located on the left sidewall of the remote device and comprises of two female banana plug connectors and two binding posts. Other suitable connectors or suitable locations for the connection port 442 can be used.
  • FIGURE 4A is a block diagram of a remote firing system.
  • a controller device 450 and at least one remote device 452 use safety communication to communicate via a transmission medium 454.
  • Signals from an interlock device 456, user inputs 458, information stored on an electronic key 460, and signals received via the transmission medium 454 are processed by the controller device 450.
  • information stored on an electronic key 462, user inputs 464, and signals received from the transmission medium 454 are processed by the remote device 452.
  • FIGURE 4B is a block diagram of internal functional modules, inputs, and outputs for a controller device 450.
  • the internal functional modules include an electronic key module 502; a programming port module 504; a self-test module 506; a battery status module 508; a controller device user interface module 510; a timer module 512; a remote device selection module 514; a controller device mode module 516; a controller device command module 518; and a communications module 520 for transmitting and receiving safety communication.
  • Inputs to the controller device can be received as information stored on an electronic key 522 coupled to the controller device key module 502; information from an interlock device 524 coupled to the programming port module 504; information from user inputs 526 selecting remote devices through the remote device selection module 514, controller device operating mode through the controller device controller device mode module 516, and commands through the command module 518.
  • Safety communication is preferably achieved by transmitting and receiving a safety data structure through an external antenna 528 coupled to the communications module 520.
  • Other devices including but not limited to radio repeaters and leaky feeder systems, can be connected in place, or in addition to, of the external antenna 528 without departing materially from the present invention.
  • the electronic key module 502 serves as a coupling interface between the controller device 450 and the external electronic key 522.
  • Information stored on the electronic key 522 is read into the controller device's internal memory (not shown) for processing by the controller device 450, or the controller device 450 can write information onto the electronic key 522 through the electronic key module 502.
  • the programming port module 504 serves as a coupling interface between the controller device 450 and an external programming device (not shown), such as a digital computer, or the interlock device 524.
  • the external programming device may allow, for example, information stored in certain memory locations to be read out of the controller device 450; information to be written into certain memory locations on the controller device 450; or modification of internal controller device settings; among others.
  • the programming port module 504 can be implemented using a 14-pin DIN type connector or other suitable connectors, designating various conductors for functionality such as battery charger contacts, external interlock device 524 input contacts, prograrnming function contacts, and contacts for additional future functionality, among others.
  • the self-test module 506 tests the internal circuitry and functionality of the controller device 450 for faults.
  • the self-test module 506 indicates component failures by flashing indicator LEDs on the controller device user interface panel 300, as discussed previously. Other suitable methods of indicating self-test results can be used.
  • the battery status module 508 displays the status and condition of a battery (not shown) in the controller device 450.
  • the battery status module 508 may include a battery capacity display, such as a gas-gauge style digital display; battery condition indicators, such as the previously discussed flashing indicator LED's on the controller device user interface panel 300; and recharge rate indicator LEDs, among others. Other suitable displays and indicators can be used.
  • the timer module 512 can be implemented mechanically, with discrete electronics, with software, or by some combinations thereof. Preferably, the timer module 512 is used for controller device features requiring elapsed time information. For example, the timer module 512 is a software implemented, countdown timer triggering the execution of a DISARM command if the controller device 450 has transmitted an ARM command and has not transmitted a FIRE command within a specified time period.
  • the communications module 520 serves to enable safety communication between the controller device 450 and other system devices through a transmission medium.
  • the communications module 520 includes a 5-watt maximum power radio transceiver for transmission and reception of radio frequency signals in the kHz to MHz range. Any suitable power or frequency range can be used for the transceiver without departing materially from the present invention. Further, other suitable methods of communication can be used.
  • the controller device user interface module 510 includes all user input into the controller device 450 not included in the remote device selection module 514, controller device mode module 516, or controller device command module 518. This module includes functions such as turning a battery meter ON or OFF, among others.
  • the remote device selection module 514 serves as an interface for the user allowing specific remote devices to be either selected or de-selected by the user. Preferably, multiple remote devices can be contemporaneously selected and operated from a single controller device.
  • the controller device command module 518 serves as the user interface to selectively initiate command signals.
  • the availahle commands may include ARM, FIRE, DISARM, and STATUS (querying the status of remote devices), among others. Other suitable commands can be used without materially departing from the present invention.
  • the controller device mode module 516 serves as the user interface for selecting the operating mode of the controller device 450.
  • the controller device mode module 516 may include NORMAL (signifying normal operation mode), PROGRAMMING (signifying prograrnming mode), and QUERY (signifying safety communication query mode, such as the SAFETY POLLTM query facility offered by Rothenbuhler Engineering Co.), among others.
  • NORMAL mode is preferably the default mode and is used for detonating explosives.
  • PROGRAMMING mode preferably allows the controller device 450 to function as a programming device for programming electronic keys. Or other programmable options.
  • the QUERY mode is preferably used to automatically test safety cornrnunication between the controller device 450 and selected remote devices (not shown.) Additional suitable modes, or suitable modification of the listed modes, can be included into the controller device mode module 516.
  • FIGURE 4C is a block diagram of the internal functional modules, inputs, and outputs for a remote device 452.
  • the internal functional modules include modules such as an electronic key module 532; a remote device user interface module 534; a self-test module 536; a programming port module 538; a battery status module 540; a timer module 542; a communications module 544; a remote device output mode module 546; and a remote device operating mode module 548; among others.
  • Inputs to the remote device 452 include information contained on an electronic key 550 coupled to the electronic key module 532.
  • Additional information can be received from user inputs 552 for selecting an output mode (through the output mode module 546), and for selecting an operating mode (through the operating mode module 548.) Additionally, safety communication can be received or transmitted by an extemal antenna 554 coupled to the communications module 544. As previously discussed, suitable alternatives can be used in place of an external antenna.
  • a signal initiating a shot is output to a chain of devices 556 terminating in a main explosive charge (not shown) as will be appreciated by one skilled in the art.
  • the electronic key module 532 serves as a coupling interface between the remote device 452 and an electronic key 550.
  • the programming port module 538 serves as a coupling interface between the remote device 452 and an external prograrnming device (not shown), for example a digital computer.
  • the external programrning device may allow, for example, information stored in certain memory locations to be read out of the remote device 452; information to be written into certain memory locations on the remote device 452; or modification of internal remote device settings; among others. Many other suitable operations can be conducted through the programming port module 538.
  • the programming port module 538 can be implemented using a 14-pin DIN type connector or other suitable connectors, designating various conductors for functionality such as battery charger contacts, programming function contacts, and contacts for additional future functionality, among others.
  • the self-test module 536 tests the internal circuitry and functionality of the remote device 452 for faults.
  • the self-test module 536 indicates component failures by flashing indicator LEDs on the remote device user interface panel 390, as previously discussed. Other suitable methods to indicate self-test results can be used.
  • the battery status module 540 displays the status and condition of a battery (not shown) in the remote device 452.
  • the battery status module 540 may include a battery capacity display, such as a digital display; battery condition indicators, such as the previously discusses flashing indicator LEDs on the remote device user interface 390; and recharging rate indicator LEDs, among others. Other suitable displays or indicators can be used.
  • the timer module 542 can be implemented mechanically, with discrete electronics, with software, or by some combination thereof. Preferably, the timer module 542 is used for remote device features requiring elapsed time information. For example, the timer module 542 is a software implemented, countdown timer triggering a DISARM command to disarm the remote device 452 if the remote device 452 has been ARMED and not FIRED within a specified time period.
  • the timer module 542 serves as a backup to the timed disarm sequence in the controller device 450 previously discussed.
  • the communications module 544 serves to enable safety communication between the remote device 452 and other system devices via a transmission medium.
  • the communications module 544 includes a 1-watt maximum power radio transceiver for transmission and reception of radio frequency signals in the kHz to MHz range. Any suitable power or frequency range can be used for the transceiver without departing materially from the present invention. Further, other suitable methods of communication can be used.
  • the remote device user interface module 534 includes all user input into the remote device 452 not included in the remote device operating mode module 548, or remote device output mode module 546.
  • This module includes functions such as turning a battery meter ON by depressing a momentary switch, among others.
  • the remote device output module 546 serves as an interface for the user allowing method selection for initiating a remote detonation (such as shock tube or electric detonators), among others.
  • the remote device operating mode module 548 serves as the user interface to select the operating mode of the remote device 452.
  • the remote device operating mode module 548 may include NORMAL (signifying normal operation mode), and PROGRAMMING (signifying programming mode), among others.
  • the NORMAL mode is preferably the default mode and is used for detonating explosives.
  • the PROGRAMMING mode preferably allows the remote device 452 to be programmed with a semi-permanently assigned device identifier.
  • FIGURES 5A-O illustrate a method for remotely detonating explosives.
  • a remote control blasting machine for remotely detonating explosives preparatory steps are undertaken to ensure the operability of the device prior to deploying it in the field.
  • several safety checks are undertaken.
  • the device in the field is armed and then fired.
  • a remote control blasting machine is generally returned to a safe environment for storage until the next use.
  • a method 600 proceeds to a set of method steps 602 between a continuation terminal ("Terminal A") and an exit terminal ("Terminal B").
  • the set of method steps 602 prepares a remote firing system for operation in a mode desired by a user. This preparation includes steps to ensure that system devices are functional, deploying system devices in the field, and connecting remote devices to explosives in a safe manner.
  • Terminal A (FIGURE 5C)
  • the method 600 proceeds to block 610 where a remote firing system's devices are powered ON.
  • each system device undergoes an automatic, internal, self-test operation. Self-testing verifies that the internal components of a device are operating within defined parameters. System devices failing the self-test are replaced. See block 614.
  • the method 600 then continues to block 616 where the system devices' batteries are queried for remaining charge. Sufficient charge to operate the devices in the field for the estimated amount of time that will be required to place, arm, and detonate all explosives should be present. At block 618 system devices without sufficient charge are either recharged or replaced.
  • terminal Al The processing steps between Terminals A and Al can be accomplished either in parallel or serially. In parallel, all devices are contemporaneously powered ON, each then undergoes the self-test before each battery is checked for sufficient remaining charge, and system devices are then replaced or recharged, as needed.
  • each device is powered ON, undergoes a self-test, the battery's remaining charge is checked, and the system device is replaced or recharged, as needed, before repeating the blocks for the next system device.
  • Some blocks between Terminals A and Al can readily be combined or further automated without departing from the present invention.
  • the processing steps described in FIGURES 5D-5F are preferably performed by a manufacturer of the remote firing system, a dealer or distributor of the manufacturer, or a service shop for the manufacturer. The user of the remote firing system needs not execute the processing steps described in FIGURES 5D-5F and these processing steps need not formed part of the use of the remote firing system in the field just prior to blasting activities.
  • the method 600 enters a decision block 620 where a test is performed to determine whether a semi-permanent device identifier is to be assigned to a remote device. If the answer is YES (a semi-permanent device identification is to be assigned), the method 600 continues to another continuation terminal ("terminal A2"). If the answer is NO (a semi-permanent device identification is not to be assigned to a remote device), the method 600 continues to another terminal continuation terminal (terminal A3). From terminal A3, the method 600 proceeds to decision block 622 where it is determined if an electronic key is to be programmed. If an electronic key is to be programmed, the method continues to another continuation terminal ("terminal A4").
  • the method 600 continues to another continuation terminal ("terminal A5"). From terminal A2 (FIGURE 5E), the method 600 proceeds to block 624 where an appropriate master electronic key is coupled to the remote device to be programmed with a semi-permanent identification. At block 626, the information stored on the master electronic key causes the remote device to enter the PROGRAMMING mode. The information stored on the master electronic key causes the remote device in PROGRAMMING mode to assume a semi-permanent device identification. See block 628. The method 600 then continues to block 630 where the master electronic key is removed. Once the master electronic key has been removed, the remote device exits PROGRAMMING mode and is now programmed semi-permanently with a device identifier.
  • the method 600 then continues to terminal Al, where it loops back to decision block 620 and repeats the above-discussed processing steps. If additional devices are to be semi-permanently assigned device identifications, this loop may be continued. If additional devices are not to be semi-permanently assigned device identifiers, the method 600 exits the loop and proceeds to continuation terminal A3. From terminal A3, the method 600 proceeds to decision block 622, as previously discussed. From terminal A4 (FIGURE 5F), the method 600 proceeds to block 632 where an electronic key is coupled to a programming device.
  • the programming device includes a controller device.
  • the programming device is placed in a PROGRAMMING mode.
  • the present programming designation of the electronic key is then suitably indicated. See block 636.
  • the method 600 continues to block 638 where a new programming designation is selected on the programming device.
  • the new programming designation data is stored on the electronic key and the key is decoupled from the programming device.
  • the programming device is then taken out of PROGRAMMING mode. See block 640.
  • the method 600 then proceeds to terminal A3 and loops back to decision block 622, where the above-discussed processing steps are repeated. If additional electronic keys are to be programmed, the loop is repeated. If no additional electronic keys are to be programmed, the method 600 continues to terminal A5.
  • the method 600 proceeds to block 670 where suitable electronic keys are placed in the remote devices according to a blast design.
  • the blast design includes the placement of explosives and pieces of a remote firing system to effect a desired blasting result designed by a blasting engineer.
  • a suitable electronic key indicates that an electronic key with a system identification, device identification, and indexed identifier is placed in each system device such that the blast engineer's plan can be executed. It is preferred that electronic keys be coupled with the remote devices for them to be able to communicate with the controller device. It is preferred that the controller device does not need an electronic key to do status queries but it is preferred that the electronic key be coupled with the controller device prior to arming or firing the remote devices.
  • the method 600 proceeds to decision block 644 where a test is performed to determine whether a polling mode is used to aid the deployment of remote devices. If the answer is NO, (the polling mode is not being used for deployment), the method 600 continues to block 646 where system devices are deployed and suitably connected. The method 600 continues to another continuation terminal ("terminal A6"). If the answer is YES (the polling mode is used to aid in deployment), the method 600 continues to block 648 where a controller device is deployed and suitably coupled to devices such as an external antenna, any external interlock devices, or external power, among others. From block 648, the method 600 continues to block 650, where the polling mode is activated on the controller device. The polling mode causes the controller device to query the status of remote devices automatically and periodically.
  • the method 600 then deployed. See block 652.
  • the method 600 then proceeds to another continuation terminal ("terminal A7").
  • Terminal A7 Other suitable polling aids can be implemented.
  • the method 600 proceeds to decision block 654 where a test is performed to determine whether deployed remote devices receive the periodically transmitted status query from the controller device placed earlier at block 648 (see FIGURE 5G). If the answer is NO (the deployed remote devices do not receive the periodic status query), the method 600 continues to block 658 where the deployed remote devices are suitably repositioned, replaced, or recharged. If the answer is YES (the deployed remote devices do receive the status query described at decision block 654), the method 600 continues to block 656 where another test is performed to determine whether the controller device is receiving status query replies from the deployed remote devices.
  • the method 600 enters block 658 where the remote devices are suitably repositioned, replaced, or recharged. From block 658 the method 600 proceeds to another continuation terminal ("terminal A7"). If at decision block 656 the answer is YES (the controller device is receiving the status query replies), the method 600 continues to block 660 where the polling mode is deactivated. The method 600 then proceeds to another continuation terminal ("terminal A8"). Repositioning the controller device at block 658 can be a suitable alternative to repositioning remote devices. Summarizing the processing steps between block 654 and block 656, the controller device automatically and periodically transmits a status query signal as remote devices are deployed.
  • the remote devices are receiving the periodic status query, they are in safety communication range. If they do not receive the status query, they are either defective, in the wrong location, or their battery has become depleted. The remote devices ought to be replaced, repositioned, or recharged. If the remote devices are receiving status queries, safety communication is confirmed by verifying that the controller device is receiving a reply to the status query. If the controller device is not receiving the reply to status query, safety communication is not established and the system devices ought to be repositioned, replaced, or recharged. Once the devices are in safety communication, the polling mode is deactivated. When the polling mode is not used to aid in the deployment of system devices at decision block 644 (FIGURE 5G), the method proceeds to terminal A6 (FIGURE 51).
  • the method 600 proceeds to decision block 662 where a test is performed to determine whether the controller and remote devices are operating in safety communication. If the answer is NO (the devices are not operating in safety communication), the method 600 proceeds to terminal A8. If the answer is YES (the devices are operating in safety communication), the method 600 continues to block 664 where a status query operation is initiated at the controller device. This transmits a single status query to deployed remote devices. At decision block 666 a test is performed to determine whether the deployed remote devices return a status in response to the status query. If the answer is YES (the remote devices return a status to the controller), the method 600 proceeds to terminal A8.
  • the method 600 proceeds to block 668 where the non-answering remote devices are repositioned, replaced, or recharged. From block 668 tihe method 600 loops back to block 664 where a single status query is transmitted from tihe controller device. This loop continues until all deployed remote devices return a status to the controller, establishing safety communication. From terminal A8 (FIGURE 5 J), the method 600 proceeds to block 672, a suitable electronic key is placed in the controller device. For blocks 670 and 672, a suitable electronic key indicates that an electronic key with a system identification, device identification, and indexed identifier is placed in each system device such that the blast engineer's plan can be executed.
  • the method 600 proceeds to Terminal B.
  • the method 600 proceeds from Terminal B in block 602 (FIGURE 5 A) to Terminal C in block 604 (FIGURE 5A).
  • Terminal C (FIGURE 5J)
  • the method 600 proceeds to block 674 where at least one remote device is selected on the controller device. (Additional remote devices, or combinations of remote devices, can be selected on the controller device at block 674.)
  • the method 600 continues to Terminal D (FIGURE 5J). From Terminal D (FIGURE 5A) the method 600 proceeds to Terminal E (FIGURE 5A) and then proceeds to Terminal E in block 606 (FIGURE 5B).
  • the method 600 proceeds to block 676 where the controller device transmits an ARM signal in response to receiving an ARM selection by the user.
  • the method 600 then continues to block 678 where the controller device automatically transmits a status query to all remote devices after the ARM signal has been transmitted.
  • a test is performed to determine whether remote devices are armed. Arming is determined by the information contained in the reply to the status query. If the answer is YES (the remote devices have armed), the method 600 continues to another continuation terminal ("terminal E2").
  • the method 600 continues to block 682 where the control device indicates that the ARM signal was transmitted, but that a confirming signal (response to the automatic status query) was not received back from one or more of the remote devices.
  • the method 600 then continues to another continuation terminal ("terminal El"). From terminal El (FIGURE 5L), the method 600 proceeds to block 684 where the controller device automatically re-queries the status of the remote devices.
  • the controller device determines the status of the remote devices.
  • the controller device indicates an assumed ARMED status.
  • An assumed ARMED status indicates to a user that the controller device transmitted the ARM command, but that a reply was not received back from the remote device and that the secondary automatic attempts to confirm an ARMED status have failed.
  • An assumed status also indicates that the remote device should be considered ARMED for any misfire procedure.
  • the method 600 continues to block 688 where either the ARM command is manually reissued or the shot is terminated for safety reasons. If the ARM command is to be reissued, blocks 680, 682, 684, and 686 will be repeated until successful arming or termination. From block 688, the method 600 proceeds to terminal E and loops back to the above-discussed processing steps. If the remote devices are ARMED at block 680, the method proceeds to terminal E2.
  • the method 600 continues to block 690 where an internal timer in each system device (both the remote devices and the controller device) begins a countdown to automatically DISARM all system devices. Preferably, if the countdown timer reaches the end of the countdown period without receiving a FIRE command, all system devices are automatically DISARMED as a safety precaution. From block 690 the method continues to terminal F. From terminal F (FIGURE 5B), in block 606 (FIGURE 5B), the method 600 proceeds to terminal G in block 608 (FIGURE 5B).
  • the method 600 proceeds to decision block 692 where a test is performed to determine whether the countdown timer for disarming has elapsed in any device resulting in automatic DISARMING. If the answer is YES (the device countdown timer has elapsed), then the method 600 proceeds to continuation terminal E so that the selected remote devices can again be ARMED. If the answer is NO (the countdown timer has not elapsed), then the method 600 continues to block 694 where the controller device transmits a FIRE signal in response to receiving a fire selection from the user command.
  • the fire command is issued by simultaneously depressing, for at least one-half second (1/2 sec), two FIRE buttons (as shown by buttons 384, 390).
  • the method 600 continues to block 696 where the controller device automatically transmits a status query to the remote devices after the FIRE signal has been transmitted.
  • the method 600 then proceeds to decision block 698 where a test is performed to determine whether the remote devices have FIRED. The determination is based on information contained in the reply to the issued status query. If the answer is YES (the remote device has FIRED), the method 600 proceeds to another continuation terminal ("terminal G2"). If the answer is NO (the remote device has not FIRED), the method 600 proceeds to another continuation terminal ("terminal GI ").
  • both replies to the status query indicating failures to fire, and failures to reply to the status query are considered as not FIRED conditions.
  • the method 600 proceeds to block 700.
  • the controller device indicates that a fire signal was transmitted, but that the confirming reply was either not received back from a remote device, or that the reply indicated an unsuccessful attempt to fire.
  • the controller automatically re-queries the status of the remote devices. If the controller device cannot confirm FIRING, the controller device indicates an assumed status. See block 704.
  • the method 600 then continues to block 706 where a misfire procedure is initiated.
  • the misfire procedure is not part of the present invention, but does determine what the user does next and is included herein for context.
  • terminal G2 The method 600 permits the selection of one or more remote devices, therefore not all deployed devices may have been selected for the preceding ARM and FIRE method steps.
  • the method 600 proceeds to decision block 708 where a test is performed to determine whether all deployed remote devices are FIRED. If the answer is NO (all deployed remote devices are not FIRED), the method 600 proceeds to terminal C, where additional remote devices can be selected, ARMED, and FIRED. If the answer is YES (all the deployed devices are FIRED), there are no more remote devices to FIRE and the method 600 proceeds to another continuation terminal ("terminal G3").
  • the method 600 proceeds to block 710 where the electronic keys are decoupled from all system devices. When system devices are decoupled from electronic keys, the devices become inoperable, yet remain ON. From block 710 the method 600 continues to block 712 where all system devices are powered OFF, the remote firing system is removed from the field, and the remote firing system is stored. From block 712 the method 600 continues to terminal H. From terminal H (FIGURE 5B) in block 608 (FIGURE 5B), the method 600 is completed and proceeds to the finish block (FIGURE 5B.) While the preferred embodiment of the invention has been illustrated and described, it will be appreciated that various changes can be made therein without departing from the spirit and scope of the invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Selective Calling Equipment (AREA)

Abstract

La présente invention concerne un système de mise à feu à distance qui sert à faire exploser à distance des charges explosives, ledit système ayant des caractéristiques qui lui permettent d'apporter des améliorations relatives à la sécurité et à l'efficacité. Ces caractéristiques comprennent la communication de sécurité entre de multiples dispositifs à distance et de multiples dispositifs de commande, une fonctionnalité d'interrogation permettant un rapide déploiement des dispositifs du système, des systèmes de clé électronique, et des dispositifs à distance programmables permettant un remplacement simple de dispositifs à distance manquants.
EP05722462A 2004-01-16 2005-01-18 Systeme de mise a feu a distance Withdrawn EP1709387A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US53715304P 2004-01-16 2004-01-16
PCT/US2005/001640 WO2005071348A1 (fr) 2004-01-16 2005-01-18 Systeme de mise a feu a distance

Publications (1)

Publication Number Publication Date
EP1709387A1 true EP1709387A1 (fr) 2006-10-11

Family

ID=34807085

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05722462A Withdrawn EP1709387A1 (fr) 2004-01-16 2005-01-18 Systeme de mise a feu a distance

Country Status (5)

Country Link
US (1) US20060011082A1 (fr)
EP (1) EP1709387A1 (fr)
AU (1) AU2005207595B2 (fr)
CA (1) CA2553560A1 (fr)
WO (1) WO2005071348A1 (fr)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060202859A1 (en) * 1998-10-08 2006-09-14 Mastrototaro John J Telemetered characteristic monitor system and method of using the same
US7559269B2 (en) 2001-12-14 2009-07-14 Irobot Corporation Remote digital firing system
US8375838B2 (en) * 2001-12-14 2013-02-19 Irobot Corporation Remote digital firing system
US8474379B2 (en) * 2004-01-16 2013-07-02 Rothenbuhler Engineering Co. Remote firing device with diverse initiators
NZ549967A (en) * 2006-09-19 2008-06-30 Mas Zengrange Nz Ltd Initiator for the remote initiation of explosive charges
CL2009001909A1 (es) * 2008-09-30 2011-06-17 Dyno Nobel Inc Un sistema y método de control de voladura que se utiliza con una máquina de voladura.
NZ592333A (en) * 2008-10-24 2014-10-31 Battelle Memorial Institute Electronic detonator system
US20120042800A1 (en) * 2009-01-28 2012-02-23 Orica Explosives Technology Pty Ltd. Selective control of wireless initiation devices at a blast site
NZ579690A (en) * 2009-09-16 2010-01-29 Mas Zengrange Nz Ltd Remote Initiator Breaching System
MX343260B (es) * 2009-09-29 2016-10-31 Orica Explosives Tech Pty Ltd Metodo para volar roca subterranea.
CN103115536B (zh) * 2013-02-08 2016-08-10 前进民爆股份有限公司 一种用于工程爆破的数码电子雷管大型起爆方法
DE102016116567A1 (de) 2016-09-05 2017-08-17 Innovative Pyrotechnik Gmbh Elektronischer Detonator
IT202000004042A1 (it) * 2020-02-27 2021-08-27 Claudio Alebardi Sistema di gestione e di accensione di prodotti pirotecnici, di cariche esplosive e/o di effetti speciali o scenici.

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005052498A1 (fr) * 2003-11-28 2005-06-09 Bohlen Handel Gmbh Procede et dispositif permettant de faire exploser des masses rocheuses ou analogue

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CH472019A (de) * 1966-05-12 1969-04-30 Karlsruhe Augsburg Iweka Verfahren und Vorrichtung zum Prüfen von Zündleitungen und Zünden von Sprengladungen
US3401631A (en) * 1966-09-16 1968-09-17 Explosive Tech Explosive cutting device
US4674047A (en) * 1984-01-31 1987-06-16 The Curators Of The University Of Missouri Integrated detonator delay circuits and firing console
GB8718202D0 (en) * 1987-07-31 1987-09-09 Du Pont Canada Blasting system
US5206455A (en) * 1991-03-28 1993-04-27 Quantic Industries, Inc. Laser initiated ordnance systems
FR2749073B1 (fr) * 1996-05-24 1998-08-14 Davey Bickford Procede de commande de detonateurs du type a module d'allumage electronique, ensemble code de commande de tir et module d'allumage pour sa mise en oeuvre
WO1999054676A2 (fr) * 1998-03-30 1999-10-28 Magicfire, Inc. Systeme et procede de presentation pyrotechnique de precision a securite et precision de synchronisation accrues
US6283227B1 (en) * 1998-10-27 2001-09-04 Schlumberger Technology Corporation Downhole activation system that assigns and retrieves identifiers
DE10084519B3 (de) * 1999-04-20 2013-08-08 Orica Explosives Technology Pty Ltd Verfahren und System zum Steuern eines Spreng-Netzwerks
US6247408B1 (en) * 1999-11-08 2001-06-19 The United States Of America As Represented By The Secretary Of The Army System for sympathetic detonation of explosives
US6718881B2 (en) * 2001-09-07 2004-04-13 Alliant Techsystems Inc. Ordnance control and initiation system and related method
CA2493703C (fr) * 2002-08-30 2008-01-29 Orica Explosives Technology Pty Ltd. Controle d'acces pour exploseurs electroniques
US6732656B1 (en) * 2002-09-16 2004-05-11 The United States Of America As Represented By The Secretary Of The Air Force High voltage tolerant explosive initiation
US7017494B2 (en) * 2003-07-15 2006-03-28 Special Devices, Inc. Method of identifying an unknown or unmarked slave device such as in an electronic blasting system
US6941870B2 (en) * 2003-11-04 2005-09-13 Advanced Initiation Systems, Inc. Positional blasting system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005052498A1 (fr) * 2003-11-28 2005-06-09 Bohlen Handel Gmbh Procede et dispositif permettant de faire exploser des masses rocheuses ou analogue

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2005071348A1 *

Also Published As

Publication number Publication date
US20060011082A1 (en) 2006-01-19
WO2005071348A1 (fr) 2005-08-04
AU2005207595A1 (en) 2005-08-04
CA2553560A1 (fr) 2005-08-04
AU2005207595B2 (en) 2011-02-03

Similar Documents

Publication Publication Date Title
AU2005207595B2 (en) Remote firing system
US8474379B2 (en) Remote firing device with diverse initiators
CN1078347C (zh) 用于引爆爆炸材料的可控电磁感应引爆系统
KR100616806B1 (ko) 개별 지연된 뇌관들로 된 발파 회로의 기폭 시스템
EP1809981B1 (fr) Assemblages de detonateurs sans fil, dispositifs de detonation correspondants et procedes de detonation
EP2062007B1 (fr) Initiateur à distance pour l'initiation à distance de charges explosives
WO2001059401A1 (fr) Systeme detonateur distant sans fil
AU2015280721B2 (en) A wireless initiation device
US5159149A (en) Electronic device
EP1488190B1 (fr) Systeme detonateur et procede associe
CN101813442A (zh) 一种无线雷管、爆破装置及爆破方法
CN201666766U (zh) 一种无线雷管组件及爆破装置
AU2021264989A1 (en) Wireless detonator assembly
AU2020230556B2 (en) Wireless detonation system
AU2013203509A1 (en) Remote firing device with diverse initiators
PL203447B1 (pl) System detonatora i sposób z nim zwi azany

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20060807

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

17Q First examination report despatched

Effective date: 20070316

DAX Request for extension of the european patent (deleted)
GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAC Information related to communication of intention to grant a patent modified

Free format text: ORIGINAL CODE: EPIDOSCIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20100121