GB2299850A - Method and device for remotely actuating mines - Google Patents

Method and device for remotely actuating mines Download PDF

Info

Publication number
GB2299850A
GB2299850A GB8815971A GB8815971A GB2299850A GB 2299850 A GB2299850 A GB 2299850A GB 8815971 A GB8815971 A GB 8815971A GB 8815971 A GB8815971 A GB 8815971A GB 2299850 A GB2299850 A GB 2299850A
Authority
GB
United Kingdom
Prior art keywords
command
mine
bit patterns
acknowledgement
mask
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB8815971A
Other versions
GB2299850B (en
GB8815971D0 (en
Inventor
Andrea Dittkrist
Klaus Engel
Udo Simon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honeywell Regelsysteme GmbH
Original Assignee
Honeywell Regelsysteme GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE3706562A external-priority patent/DE3706562C1/en
Priority to DE3706562A priority Critical patent/DE3706562C1/en
Priority to DE3721121A priority patent/DE3721121C1/en
Priority to GBGB8812909.3A priority patent/GB8812909D0/en
Application filed by Honeywell Regelsysteme GmbH filed Critical Honeywell Regelsysteme GmbH
Priority to GB8815971A priority patent/GB2299850B/en
Priority to FR8809592A priority patent/FR2731792B1/en
Publication of GB8815971D0 publication Critical patent/GB8815971D0/en
Publication of GB2299850A publication Critical patent/GB2299850A/en
Publication of GB2299850B publication Critical patent/GB2299850B/en
Application granted granted Critical
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C17/00Fuze-setting apparatus
    • F42C17/04Fuze-setting apparatus for electric fuzes
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C11/00Electric fuzes
    • F42C11/001Electric circuits for fuzes characterised by the ammunition class or type
    • F42C11/007Electric circuits for fuzes characterised by the ammunition class or type for land mines
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C15/00Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges
    • F42C15/40Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically
    • F42C15/42Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically from a remote location, e.g. for controlled mines or mine fields

Abstract

In a programming phase, particular command and acknowledgement bit patterns are agreed via a monitoring- and interference-proof infrared channel with a mine 10 - 10 IV or a group of mines by means of a handset 18. In a command phase, the mines are armed or disarmed via a radio-frequency channel which can be monitored, during which process, however, only commands and acknowledgements previously agreed in the programming phase are accepted. For enciphering and deciphering a command transmitted from an operating station (10, Fig 6) to a mine station (30, Fig 6) and of an acknowledgement transmitted in the reverse direction, the command bit patterns and acknowledgement bit patterns are in each case logically combined with mask bit patterns in a mask bit memory (14, 34) by means of exclusive OR gates (18, 20; 44, 46). The mine station (30) in each case keeps available two adjacently located mask bit patterns for the logical operation in order to be able to recognize the transmitted command in the case of an interference in the back channel. The mask bit patterns in the mask memories (14, 34) of the operating station (10) and of the mine station (30) are incremented upon transmission and successful reception of command data.

Description

Method and device for remotely actuating mines The present invention relates to a method for remotely actuating mines in accordance with the generic concept of Patent Claim 1 and to a device for carrying out this method.
From German Patent Specification 977,974 it is known to disarm and thereafter also to rearm a sea mine, if necessary, by vireless remote control, this being done, for example, by means of a low-frequency modulated current flow, generated by a minesweeper, through the surrounding water. Each mine is equipped with a receiver to control the firing mechanism, by means of the received electrical energy and due to the frequency or modulation of the current flow, via a relay into the safe position or into the armed position. In this manner, a minefield can be temporarily controlled to be ineffective for the passage of friendly ships and thereafter armed again.
However, an enemy can also receive the information located in the trequency or modulation of the current flow through the water, analyze this information and in turn change the status of the minefield undetectedly in his own interest. The same method could be used in the case of landmines, where appropriate radiowaves are transmitted through the atmosphere. However, this results in the same uncertainties.
A resecurable mine has also been previously proposed (German Patent Application P 35 38 786.6, P 35 45 289.7), in which a securing code is entered in a memory in the mine which is then later compared with a signal code entered by other means via a code switch or acoustically, a fuse securing device being reset into the secured position only when the two codes correspond.
Apart from the fact that remote actuation over long distances is not possible in this solution, each code convention in advance represents an uncertainty since an enemy can acquire possession of this code. In addition, a manual or an acoustic input of the signal code is not in every case copy- or monitoring-proof.
The present invention therefore has the object of specifying a method for remotely actuating mines which is safe against reconnaissance and deliberate manipulation in every case. This object is achieved in accordance with the method according to the invention, characterized in Patent Claim 1. Further advantageous developments of the method and a device for carrying out the method are to be found in the subclaims.
By using a monitoring-proof separate channel in a preliminary programming phase, it is possible to agree with individual mines specific command and acknowledgenent bit patterns which ensure in a subsequent command phase, in which the commands are transmitted via a channel which can be monitored, that communication is only possible between command device and mine. This renders impossible any passive or active impairment of the data transmission between command device and mine by an enemy and accidental or systematic disturbances due to the physical properties of the transmission channel can be prevented by appropriate coding schemes and filters.
Preferably, respective enciphering and deciphering can be performed by superimposing bit patterns generated in a pseudo-random generator on the command and acknowledgement bit patterns.
Preferably both the command transmission and the return acknowledgement message are provided with a monitoring possibility. More particularly, the command and acknowledgement bit patterns are logically combined with stored mask bit patterns during transmission and reception for the purpose of enciphering and deciphering the command and acknowledgement bit patterns.
In the text which follows, the method according to the invention and illustrative embodiments for carrying out this method will be explained with reference to the figures of the attached drawing, in which: Figure 1 shows a typical application situation for the method according to the invention; Figure 2 shows the principle of enciphering and deciphering information to be transmitted between a transmitter and a receiver; Figure 3 shows a block diagram of a handset; Figure 4 shows a block diagram of a device at the mine; Figure 5 shows a handset in a topview; and Figure 6 shows a block diagram of another embodiment of the invention.
According to Figure 1, a number of anti-tank mines 10 to lOIY are installed along a road 12 on which a vehicle 14 approaches. A soldier 16 operates from cover a handset 18 by means of which the mines 10 to 101V can be, for example, armed individually or in groups, in a manner still to be described in greater detail, if they have been previously appropriately programmed. Whilst the command transmission occurs via a radio frequency (RF) channel which can be monitored, the programming is effected via a directional infrared (IR) channel which is secure against monitoring and interference.
Apart from the monitoring- and interference-proof channel, an enciphering system is additionally used in the programming phase, in which the commands and acknowledgements present in plain text are supplied, according to Figure 2, in the transmitter 20 to a binary encoder 22 which converts the commands and acknowledgements into corresponding redundant bit patterns. Enciphering the corresponding commands and acknowledgements is effected by superimposition of the bit pattern generated in a pseudorandom generator 24 in a binary adder 26. A corresponding method is used during the deciphering in a receiver 28 and this is therefore equipped with the same equipment elements.
According to Figure 3, the handset essentially exhibits the following components: a microcomputer 30 which is provided in known manner with a central processing unit CPU, a program memory ROM, a working memory RAM and corresponding interfaces and which, as the central element, controls all other components.
A non-volatile memory 32 in which the commands and acknowledgements agreed between the handset and the mines are stored.
An operating panel 34 via which the "programming" or "remote control" operating mode can be selected in a manner still to be described in greater detail. The "pro gramming" operating mode is used when setting up and activating the mine or mines, during which process commands and acknowledgements are agreed between the handset and the mine or mines. In the "remote control" operating mode, a programmed mine is selected to enter into it a corresponding command.
A display 36 indicates to the operator of the handset the respective number of the mine selected and displays the selected command and operating state of the mine selected.
An analog noise generator 38 is used for initializing a pseudo-random generator, described by means of Figure 2 and implemented by software in the microcomputer in the present case.
A power supply 40 consists of a battery set and is used for cycling and switching the supply voltage of particular assemblies, which can be done via switches operated by the microcomputer 30.
An RF transmitter/receiver 40, 42' is used for radiating and receiving RF signals in the command phase.
An IR transmitter/receiver 44, 44' provides the monitoringproof channel in the programming phase.
According to Figure 4, each mine also contains a microcomputer 50 which is equipped in accordance with the microcomputer of the command set and is also used for centrally controlling the remaining components.
A display 52 indicates, clearly visible to the eye, the state of the nine, namely whether it is armed or disarmed. A power supply 54 is again used for providing a supply voltage for the various components. An RF transmitter/receiver device 56, 56' and an IR transmitter/ receiver device 58, 58' is again arranged to form the command channel, which can be monitored, and the monitor ing-proof programming channel with the corresponding components of the handset.
During the programming of the mine or of a group of mines via the monitoring- and interference-proof IR channel of limited local effect, the commands and acknowledgements required for the later command phase are agreed between the handset (Figure 3) and the mine or mines (Figure 4) which amounts to an initial loading of the deciphering system of the mine. Since these bit patterns are only defined in the programming phase, a maximum of security against deliberate enemy attempts at influencing is provided later.
The programming of a mine occurs as follows: 1. The handset generates, on a pseudo-random basis, com mand and acknowledgement bit patterns, provides these with redundancy and transmits them to the mine via the IR channel.
2. The mine to be programmed receives these bit patterns, checks their correctness from the redundancy and ack nowledges reception by sending out plant-defined bit patterns. These acknowledgements, such as, for example, "mine programmed" or "mine not programmed", however, only apply during the programming phase.
3. Once the mine has been successfully programmed, the handset indicates the mine state "safe".
4. If errors have occurred during the programming, the handset repeats the programming attempt. It continues this cycle until the programming of the mine is in dicated as successful or it must be considered to be defective after a limited number of attempts.
5. If the programming of the mine was not successful, the mine does not acknowledge the programming or answers with "not programmed", the handset indicates the mine state "no contact".
6. After the successful or unsuccessful programming of a mine, the respective mine state "safe" or "no contact" is still indicated for a certain time. The mine number counter is subsequently incremented and the handset is ready for programming further mines.
After the successful programming of one or several mines, the handset must be switched to the "remote control" operating mode, that is to say into the command phase. The mines can now only be addressed via the RF radio channel which can be monitored. In this command phase, an operator of the handset can remotely control individual mines or even entire mine groups. For this purpose, he must select the required mine or the mine group and the command to be executed. In the command phase, a mine is remotely controlled as follows: 1. The handset transmits the redundancy-equipped command bit pattern via the RF channel in accordance with the selected mine and the required command.
2. All programmed mines receive this bit pattern and check its correctness from the redundancy. However, this command has only been agreed with a single mine or a single group of mines during the programming phase.
3. If the checked bit pattern has been recognized as command by the mine selected, it executes the pre determined instruction and acknowledges execution by sending out its new "safe" or "armed" state via the RF channel.
4. If the status transmitted by the mine is received by the handset and is graded as valid after the redund ancy check, this mine status is displayed on the dis play of the handset.
5. If errors have occurred during the remote control, that is to say if, for example, there was interference on the RF channel and the command was wrongly received, the handset repeats the remote control attempt. It continues this cycle until a valid mine status has been detected or the connection to this mine must be considered to be disturbed after a limited number of attempts.
6. If the remote control attempt was not successful, the handset indicates the "no contact" state of the mine.
The handset can exhibit, for example, the construction shown in Figure 5. A key 60 arranged on the side can be used for switching on the handset. The microcomputer contained in the handset 18 automatically switches off the power supply if there has been no operator input, such as, for example, selection of a mine, communication with a mine and so forth within a certain time after the switch-on key 60 has been operated. A display panel is provided in the upper quarter of the handset 18, a first single-digit LCD display 62 being used for indicating a mine group number and a two-digit LCD display 64 being used for indicating the number of a selected mine.Three light-emitting diodes 66, 68 and 70 arranged adjacently above one another are used for representing the mine state which can be predetermined by "safe", "armed" and "no -contact". Below the display panel, there is a toggle switch 72 by means of which the programming phase or the command phase can be selected.Below this toggle switch, there is an operating keypanel which comprises ten keys (0-9) for entering a mine number, one key (all) for selecting all programmed mines, one key (group) for selecting a mine group, one key (DEF) for defining a mine group, one key (DEF delete) for deleting group allocations, one key (display) for displaying the group association of mines, three command keys (disarm, arm, state), one key (hold/delete) for interrupting the command execution and for correcting an input and one key (enter/transmit) for terminating an input and for starting the data transmission from the handset to the mine.
Referring now to Figure 6, a description will now be given of a further development which aims to simplify the latter technique. In this connection, the device shows te construction of a handset 10 as operating station and of a mine station 30 which can be provided by a single mine or a group of mines to be actuated in the same manner.
The handset 10 has a command memory 12 in which particular commands are stored by means of corresponding bit patterns. Furthermore, the handset 10 exhibits an acknowledgement memory 24 in which particular acknowledgements are stored by means of corresponding bit patterns. Finally, the handset 10 exhibits a mask memory 14 which is loaded with randomly generated bit patterns in memory rous a1 to an. A window 16 is used for reading out in each case one row al of the mask memory 14 and is moved step by step over the oask memory 14 in the direction indicated by the arrow. When a command is transmitted, an exclusive OR gate 18 logically combines the command bit pattern stored in the command memory 12 with the mask bit pattern of the mask memory 14 underneath the window 16. Similarly, an exclusive OR gate 20 logically combines the acknowledgement bit pattern with the mask bit pattern of the mask memory 14 underneath the window 16 when an acknowledgement is received. The deciphered acknowledgement bit pattern is compared with the acknowledgement bit patterns stored in the acknowledgement memory 24 in a comparator 22.
The command bit patterns, acknowledgement bit patterns and mask bit patterns allocated to a mine station 30 are generated on a pseudo-random basis in the handset 10 and transmitted to the mine station 30 via a monitoringproof channel so that they exist identically in the handset 10 and in the mine station 30. These bit patterns are loaded in a programming phase which precedes a command phase, and a radio channel which can be monitored can then be used in the command phase.
In correspondence vith the handset 10, the mine station 30 has an acknowledgement memory 32, a mask memory 34 and a command memory 50 and two exclusive OR gates 44 and 46 and a comparator 48. In this arrangement, however, the comparator 48 is used for comparing the deciphered command with the command stored in a command memory 50. In deviation from the handset 10, the mine station 30 has a dual window 40, consisting of a main window 36 and an auxiliary window 38, for sampling the mask memory 34. A switch 42 allows the mask bit pattern underneath the main or underneath the auxiliary window 36 of 38, respectively, to be optionally used for an ex clusivc OR (EOR) combination.
In principle, it is sufficient to agree three commands and two acknowledgements, namely the commands for "disarming", "arming" and "status?" and the acknowledgements "safe" and "armed", in which arrangement the bit patterns of all commands and acknowledgements differ from one another in as many bit positions as possible and the commands and acknowledgements also must be different with respect to their bit patterns. It should also be pointed out that different commands and acknowledgements are agreed for each mine or group of mines so that individual influencing and acknowledgement is possible.
In the text which follows, the enciphering and deciphering vill be explained with reference to a command transmission. For example, the mine is to be armed by the command "arming". According to the single figure, in this case, the bit pattern 001010 is subjected to an EOR operation with the mask bit pattern 110110 in the handset 10 which leads to the enciphered transmitted arming command 111100. This command is transmitted by a radio link to be received and deciphered in the mine station 30 vhere it is again subjected to an EOR operation with the same mask bit pattern 110110 located underneath the main window 36, for deciphering purposes, which leads to the deciphered command bit pattern 001010.The correctness and validity of the command received can be established by a comparison in the comparator 48 vith the stored command set and a corresponding "armed" acknowledgement can be triggered and sent back enciphered in the same manner.
Coding of the commands and atknowledgements by means of six bits only represents a simplified illustrative embodiment. The probability that a command becomes detectable with a wrong mask with a randomly generated content of the memories becomes less if a greater command, acknowledgement and mask length is selected. If, for example, a coding length of 48 bits is selected, a theoretical error probability of 2 is obtained.The operation of the device shown in the figure, and thus the method according to the invention, will be explained in the text which follows with reference to three case examples: Case 1: No interference on the forward and back channel A command from the command set of the command memory 12 is logically combined with row a1 underneath the window 16 of the mask memory 14 via the gate 18 and transmitted to the mine station 30 via the transmission channel. In the mine station 30, the incoming command is logically combined via the gate 46 with the mask bit pattern read out in row a1 by the main window 36, as a result of which the command bit pattern is obtained again in the manner already shown.The comparator 48 compares this command bit pattern with the command set in the command memory 50 and, in the case of correspondence, the corresponding acknowledgement bit pattern is logically combined via the gate 44 with the mask bit pattern in row a1 underneath the main window 36 of the mask memory 34.
The acknowledgement signal enciphered in this manner is sent back to the handset 10 via the back channel. The mine station 30 increments the dual window 40 so that the main window 36 is located above row ai + 1 and the auxiliary window 38 is located above row a1. When the valid acknowledgement arrives in the handset 10, the win dow 16 is also incremented from row a1 to row ai + 1.
After that, a further command can be issued. The process is then correspondingly repeated with the mask bit patterns in rows ai + 1 ai + 2 and so forth.
Case 2: Disturbances in the forward channel This case is relatively simple since a command not arriving or a command arriving with errors does not have any effect in the mine station 30. As a result, an acknowledgement is also lacking. According to the convention, the handset 10 does not increment the window 16 sampling the mask memory 14 because of the lacking acknowledgement and the mine station 30 also does not increment the dual window 40 as long as no valid command is detected. In this manner, synchronism between handset 10 and mine station 30 is maintained.
Case 3: Interference in the back channel A command logically combined with a mask bit pattern in row a1 of the mask memory 14 in the handset 10 is received in the mine station 30 and there causes, as described in case 1, the acknowledgement to be produced and the dual window 40 to be incremented in the mask memory 34. The mask bit pattern a1 then appears in the auxiliary window 38 whereas the main window 36 contains the mask bit pattern located in row ai + 1. Due to the assumed interference in the back channel, the handset 10 does not receive a valid acknowledgement so that the window 16 is not incremented in the mask memory 14 of the handset 10.
If then a further command is issued form the handset 10, it will still be logically combined with the bit pattern in row a1. However, the mine station 30 can then establish that it can only detect a logical command if it combines it with the content of the auxiliary window 38 because the main window 36 is already above row ai + 1.
The mine station 30 responds by executing the command and providing a status return message in the form of the acknowledgement. However, it does not increment its dual window 40. If the handset 10 is now capable of receiving the acknowledgement, the window 16 is also incremented there in the mask memory 14. With the next command, the mine station 30 will retrieve the command bit pattern again with the mask from the main window 36 which then leads to the dual window 40 being incremented. Accordingly, the dual window 40 in the mine station 30 is incremented only if the command bit pattern can be retrieved by means of the mask from the main window 36.
It is obvious that all memories existing in the figure shown and the exclusive OR gates and the comparator are preferably implemented by means of a microcomputer which can also make the abovementioned decisions for incrementing the windows.

Claims (23)

Patent claims:
1. Method for remotely actuating (disarming, arming) mines by wireless remote control in a command phase, characterized in that after the installation and before the remote actuation of each mine, command and acknow ledgement bit patterns are agreed in a programming phase with this mine or with a group of mines via a monitoringand interference-proof channel of limited local effect, so that response is obtained in the command phase only to commands agreed in the programming phase.
2. Method according to Claim 1, characterized by a programming arrangement via an infrared (IR) channel.
3. Method according to Claim 1, characterized in that the command and acknowledgement bit patterns are generated on a pseudo-random basis and are equipped with redundancy.
4. Method according to Claim 1, characterized in that the same command and acknowledgement bit patterns are agreed for a group of mines.
5. Device for carrying out the method according to one of Claims 1 to 4, characterized by in each case one microcomputer (30, 50) and one RF transmitting/receiving device (42, 42'; 56, 56') and an IR transmitting/receiving device (44, 44'; 58, 58') in a handset (18) and in the mine (10 - 10IV)
6. Device according to Claim 5, characterized by a non-volatile memory (32) in the handset (18) for the storing of commands and acknowledgements agreed per mine or mine group.
7. Device according to Claim 6, characterized by a noise generator (36) for initializing pseudo-random generators (24, 24') arranged in the handset and in the mine.
8. Device according to Claim 7, characterized by display devices (36, 52) for indicating at the handset the number of the selected mine or mine group, the required command and the operating state of the mine and, at the mine, its operating state.
9. Method according to any of claims 1-4 characterized in that the command and acknowledgement bit patterns are logically combined with stored mask bit patterns transmission and reception for the purpose of enciphering and deciphering the command and acknowledgement bit patterns.
10. Method according to Claim 9, characterized in that the same mask bit patterns are used in the operating station and the mine.
11. Method according to Claim 9, characterized by a time-synchronous sampling of the mask bit patterns.
12. Method according to one of Claims 9 toil characterized in that the logical combination is predetermined by an exclusive OR combination.
13. Method according to Claim 12, characterized in that the exclusive OR operation is performed with the same mask bit pattern in each case during transmission and during reception of a command or acknowledgement bit pattern.
14. Method according to Claim 13, characterized in that the time-synchronous incrementing of the mask bit pattern in the operating station is performed only if a valid acknowledgement bit pattern is received after transmission of a command bit pattern.
15. Method according to Claim 13, characterized in that the time-synchronous incrementing of the mask bit pattern in the mine is performed only if a valid command bit pattern is received the representation of which differs from the representation of the previously received command bit pattern.
16. Method according to Claim 15, characterized in that two adjacently located mask bit patterns are used in the mine, that on reception of a valid command bit pattern in the mine, the adjacently located mask bit patterns are incremented, that on reception of an invalid acknowledgement bit pattern in the operating station, the mask bit pattern is not displaced in the latter so that on transmission of the next command bit pattern on the transmit side the logical combination is effected with the same mask bit pattern and that on reception in the mine the mask bit pattern displaced back of the adjacently located mask bit patterns is used for the logical combination.
17. Method according to any of Claims 9 to 16 characterized in that the command, acknowledgement and mask bit patterns are loaded on a pseudo-random basis.
18. Device for carrying out the method according to one of Claims 9 to 17,characterized by in each case one command memory (12, 50) and acknowledgement memory (24, 32) and a mask memory (14, 34) in the operating station (10) and in the mine (30), time-synchronously moved windows (16, 40) for reading-out in each case one row (awl) of the mask memories (14, 34), and logical combining elements (18, 20; 44, 46) for enciphering or deciphering, respectively, the transmitted or received, respectively, command bit patterns and acknowledgement bit patterns.
19. Device according to Claim 18, characterized by comparators (22, 48) in the operating station (10) and the mine (30) for comparing the received deciphered command bit pattern with command bit patterns in the command memory (50) of the mine (30) and for comparing the received deciphered acknowledgement bit patterns with acknowledgement bit patterns in the acknowledgement memory (24) of the operating station (10).
20. Device according to Claim 18, characterized in that the window (40) in the mine (30) consists of a dual window extending over two rows of the mask memory (34), the main window (36) of which is incremented in synchronism with the window of the operating station (10) and the auxiliary window (38) of which is displaced back by one row.
21. A method according to any of claims 1-4 and substantially as herein described with reference to Figures 1-5 of the accompanying drawing.
22. A method according to any of claims 9-17 and substantially as herein described with reference to Figure 6 of the accompanying drawing.
23. A device according to any of Claims 17-19 and substantially as herein described with reference to Figure 6 of the accompanying Drawing.
23. A device according to any of claims 6-8 and substantially as herein described with reference to Figures 1-5 of the accompanying drawing.
24. A device according to any of claims 18-20 and substantially as herein described with reference to Figure 6 of the accompanying drawing.
Amendments to the claims have been tiled as follows 1. Method for remotely actuating (disarming, arming) mines by RF remote control in a command phase, characterized in that after the installation and before the remote actuation of each mine, command and acknowledgement bit patterns are agreed in a programming phase with this mine or with a group of mines via an infrared (IR) channel of limited local effect, so that response is obtained in the command phase only to commands agreed in the programming phase.
2. Method according to Claim 1, characterized in that the command and acknowledgement bit patterns are generated on a pseudo-random basis and are equipped with redundancy.
3. Method according to Claim 1, characterized in that the same command and acknowledgement bit patterns are agreed for a group of mines.
4. Device for carrying out the method according to any of Claims 1 to 3, characterized in that the device includes a microcomputer (30, 50), a RF transmitting/receiving device (42, 42'; 56, 56') and an IR transmitting/receiving device (44, 44'; 58, 58') in a handset (18) and in the mine (10 lOIV), whereby the RF device is used in the command phase and the IR device is used in the programming phase.
5. Device according to Claim 4, characterized by a nonvolatile memory (32) in the handset (18) for the storing of commands and acknowledgements agreed per mine or mine group.
6. Device according to Claim 5, characterized by a noise generator (36) for initializing pseudo-random generators (24, 24') arranged in the handset.
7. Device according to Claim 7, characterized by display devices (36, 52) for indicating at the handset the number of the selected mine or mine group, the required command and the operating state of the mine and, at the mine, its operating state.
8. Method according to any of Claims 1-4 characterized in that the command and acknowledgement bit patterns are logically combined with stored mask bit patterns transmission and reception for the purpose of enciphering and deciphering the command and acknowledgement bit patterns.
9. Method according to Claim 8, characterized in that the same mask bit patterns are used in the operating station and the mine.
10. Method according to Claims 8 or 9, characterized in that the logical combination is predetermined by an exclusive OR combination.
11. Method according to Claim 10, characterized in that the exclusive OR operation is performed with the same mask bit pattern in each case during transmission and during reception of a command or acknowledgement bit pattern.
12. Method according to any of Claims 8-11, characterized by sampling and incrementing of the mask bit patterns.
13. Method according to Claim 12, characterized in that the incrementing of the mask bit pattern in the operating station is performed only if a valid acknowledgement bit pattern is received after transmission of a command bit pattern.
14. Method according to Claim 12, characterized in that the incrementing of the mask bit pattern in the mine is performed only if a valid command bit pattern is received the representation of which differs from the representation of the previously received command bit pattern.
15. Method according to Claim 14, characterized in that two adjacently located mask bit patterns are used in the mine, that on reception of a valid command bit pattern in the mine, the adjacently located mask bit patterns are incremented, that on reception of an invalid acknowledgement bit pattern in the operating station, the mask bit pattern is not displaced in the latter so that on transmission of the next command bit pattern on the transmit side the logical combination is effected with the same mask bit pattern and that on reception in the mine the mask bit pattern displaced back of the adjacently located mask bit patterns is used for the logical combination.
16. Method according to any of Claims 8-15, characterized in that the command, acknowledgement and mask bit patterns are loaded on a pseudo-random basis.
17. Device for carrying out the method according to any of Claims 8-16, characterized by in each case one command memory (12, 50) and acknowledgement memory (24, 32) and a mask memory (14, 34) in the operating station (10) and in the mine (30), moved windows (16, 40) for reading-out in each case one row (al) of the mask memories (14, 34), and logical combining elements (18, 20; 44, 46) for enciphering or deciphering, respectively, the transmitted or received, respectively, command bit patterns and acknowledgement bit patterns.
18. Device according to Claim 17, characterized by comparators (22, 48) in the operating station (10) and the mine (30) for comparing the received deciphered command bit pattern with command bit patterns in the command memory (50) of the mine (30) and for comparing the received deciphered acknowledgement bit patterns with acknowledgement bit patterns in the acknowledgement memory (24) of the operating station (10).
19. Device according to Claim 17, characterized in that the window (40) in the mine (30) consists of a dual window extending over two rows of the mask memory (34), the main window (36) of which is incremented with the window of the operating station (10) and the auxiliary window (38) of which is displaced back by one row with respect to the main window.
20. A method according to any of Claims 1-3 and substantially as herein described with reference to Figures 1-5 of the accompanying Drawing.
21. A method according to any of Claims 8-16 and substantially as herein described with reference to Figure 6 of the accompanying Drawing.
22. A device according to any of Claims 5-7 and substantially as herein described with reference to Figures 1-5 of the accompanying Drawing.
GB8815971A 1987-02-28 1988-07-05 Method and device for remotely actuating mines Expired - Lifetime GB2299850B (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
DE3706562A DE3706562C1 (en) 1987-02-28 1987-02-28 Remote-operating system for land mines
DE3721121A DE3721121C1 (en) 1987-02-28 1987-06-26 Remote mine operating method
GBGB8812909.3A GB8812909D0 (en) 1987-02-28 1988-06-01 Method and device for remotely actuating mines
GB8815971A GB2299850B (en) 1987-02-28 1988-07-05 Method and device for remotely actuating mines
FR8809592A FR2731792B1 (en) 1987-02-28 1988-07-13 METHOD AND DEVICE FOR REMOTE CONTROL OF MINES

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE3706562A DE3706562C1 (en) 1987-02-28 1987-02-28 Remote-operating system for land mines
GB8815971A GB2299850B (en) 1987-02-28 1988-07-05 Method and device for remotely actuating mines
FR8809592A FR2731792B1 (en) 1987-02-28 1988-07-13 METHOD AND DEVICE FOR REMOTE CONTROL OF MINES

Publications (3)

Publication Number Publication Date
GB8815971D0 GB8815971D0 (en) 1996-06-19
GB2299850A true GB2299850A (en) 1996-10-16
GB2299850B GB2299850B (en) 1997-04-16

Family

ID=27195539

Family Applications (1)

Application Number Title Priority Date Filing Date
GB8815971A Expired - Lifetime GB2299850B (en) 1987-02-28 1988-07-05 Method and device for remotely actuating mines

Country Status (3)

Country Link
DE (1) DE3721121C1 (en)
FR (1) FR2731792B1 (en)
GB (1) GB2299850B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004008063A1 (en) * 2002-07-11 2004-01-22 Raytheon Company Method and apparatus for preventing unauthorized use of equipment
US6748869B1 (en) * 1998-12-16 2004-06-15 Delegation Generale Pour L'armement Batiment La Rotonde Device for firing a primer
EP1632745A1 (en) * 2004-09-06 2006-03-08 COMET GmbH Pyrotechnik-Apparatebau Process for conducting defense and/or safety exercices as well as device therefore
DE19925721B4 (en) * 1999-06-07 2015-11-05 Caterpillar Global Mining Europe Gmbh Method and device for the remote-controlled actuation of a control device
WO2015039148A3 (en) * 2013-09-03 2016-02-11 Detnet South Africa (Pty) Limited Detonator identification
CN105352378A (en) * 2015-12-11 2016-02-24 王光树 Infrared landmine

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE977974C (en) * 1962-12-22 1974-07-25 Hagenuk Neufeldt Kuhnke Gmbh Method and device for sharpening and / or defusing sea mines by wireless remote control
DE3545289A1 (en) * 1985-12-20 1987-06-25 Honeywell Regelsysteme Gmbh Mine which can be made safe again

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6748869B1 (en) * 1998-12-16 2004-06-15 Delegation Generale Pour L'armement Batiment La Rotonde Device for firing a primer
DE19925721B4 (en) * 1999-06-07 2015-11-05 Caterpillar Global Mining Europe Gmbh Method and device for the remote-controlled actuation of a control device
WO2004008063A1 (en) * 2002-07-11 2004-01-22 Raytheon Company Method and apparatus for preventing unauthorized use of equipment
US6975204B1 (en) 2002-07-11 2005-12-13 Raytheon Company Method and apparatus for preventing unauthorized use of equipment
EP1632745A1 (en) * 2004-09-06 2006-03-08 COMET GmbH Pyrotechnik-Apparatebau Process for conducting defense and/or safety exercices as well as device therefore
WO2015039148A3 (en) * 2013-09-03 2016-02-11 Detnet South Africa (Pty) Limited Detonator identification
US9671207B2 (en) 2013-09-03 2017-06-06 Detnet South Africa (Pty) Ltd (Za) Detonator identification and timing assignment
AU2014318380B2 (en) * 2013-09-03 2018-05-10 Detnet South Africa (Pty) Limited Detonator identification
EA030112B1 (en) * 2013-09-03 2018-06-29 Детнет Саус Африка (Пти) Лимитед Detonator identification and timing assignment
CN105352378A (en) * 2015-12-11 2016-02-24 王光树 Infrared landmine

Also Published As

Publication number Publication date
GB2299850B (en) 1997-04-16
DE3721121C1 (en) 1996-06-20
FR2731792A1 (en) 1996-09-20
GB8815971D0 (en) 1996-06-19
FR2731792B1 (en) 1997-07-18

Similar Documents

Publication Publication Date Title
US4686529A (en) Remote-control lock system
US6860206B1 (en) Remote digital firing system
KR100924978B1 (en) Remote control device and method of configuration of such a remote control device
US5191610A (en) Remote operating system having secure communication of encoded messages and automatic re-synchronization
US5905445A (en) Keyless entry system with fast program mode
US6191701B1 (en) Secure self learning system
US4847614A (en) Electronic remote control means, especially for centrally controlled locking systems in motor vehicles
US5686904A (en) Secure self learning system
US5952933A (en) System having advanced embedded code hopping encryption and learn mode therefor
US5159329A (en) Method for safeguarding code words of a remote control system
EP0372285B1 (en) Devices for the remote transmission of controls in security
US6956460B2 (en) Transmitter for operating rolling code receivers
US5594429A (en) Transmission and reception system and signal generation method for same
DE69919128T2 (en) REMOTE CONTROL INSTALLED IN THE VEHICLE
US6512462B1 (en) Dual function radio frequency remote control system for a motor vehicle
US20120011992A1 (en) Remote digital firing system
JP2000516313A (en) Improved secure self-learning system
US20050024228A1 (en) Method for matching transmitters and receiver
GB2299850A (en) Method and device for remotely actuating mines
WO1992002702A1 (en) Remote programming of vehicle functions
US5760701A (en) Keyless entry system
CN1643548B (en) Method for reprogramming bidirectional objects
US6982628B1 (en) Mechanism for assigning an actuator to a device
EP0885502A1 (en) Authentication system and method for a remote keyless entry system
KR102562654B1 (en) Safety switch with differential CPU

Legal Events

Date Code Title Description
PE20 Patent expired after termination of 20 years

Expiry date: 20080704