WO2012061850A1 - Module de commande d'explosion sans fil - Google Patents

Module de commande d'explosion sans fil Download PDF

Info

Publication number
WO2012061850A1
WO2012061850A1 PCT/ZA2011/000072 ZA2011000072W WO2012061850A1 WO 2012061850 A1 WO2012061850 A1 WO 2012061850A1 ZA 2011000072 W ZA2011000072 W ZA 2011000072W WO 2012061850 A1 WO2012061850 A1 WO 2012061850A1
Authority
WO
WIPO (PCT)
Prior art keywords
blasting
receiver
module according
command
blasting module
Prior art date
Application number
PCT/ZA2011/000072
Other languages
English (en)
Inventor
Craig Charles Schlenter
Original Assignee
Detnet South Africa (Pty) Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Detnet South Africa (Pty) Ltd filed Critical Detnet South Africa (Pty) Ltd
Priority to AU2012101113A priority Critical patent/AU2012101113A4/en
Publication of WO2012061850A1 publication Critical patent/WO2012061850A1/fr

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C15/00Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges
    • F42C15/40Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically
    • F42C15/42Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically from a remote location, e.g. for controlled mines or mine fields
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42DBLASTING
    • F42D1/00Blasting methods or apparatus, e.g. loading or tamping
    • F42D1/04Arrangements for ignition
    • F42D1/045Arrangements for electric ignition
    • F42D1/05Electric circuits for blasting
    • F42D1/055Electric circuits for blasting specially adapted for firing multiple charges with a time delay

Definitions

  • This invention relates to a wireless blasting module for detonating an explosive charge.
  • An electronic blasting system offers better timing accuracy than a pyrotechnic or shock tube-based system. This is particularly important so in an application in which improved rock fragmentation and low vibration are dependent upon accurate timing. Nonetheless, an electronic blasting system suffers from a disadvantage in that it is normally based on the use of an insulated electrical conductors or wires to interconnect electronic detonators to one another and to a control device.
  • the wires can be broken, for example when priming the blasting holes or during stemming procedures. Damage to the insulation on the wires can result in current leakage which, in turn, can impair communication capability.
  • the wires when positioned on an exposed surface, are also prone to damage by personnel and machinery.
  • a blasting system based on wireless techniques avoids the need for electrical conductors.
  • a wireless system can be expensive and there is an ongoing concern about safety levels inherent in this type of technology.
  • US2008/0307993A1 proposes wirelessly coupling blasting energy into detonators at blast time so that wireless blasting modules can function at low voltages and currents before blast time. This technique does require a high power transmitter which is capable of transferring energy at the required level, through the rock which is to be blasted, to the blasting modules.
  • US4685396 is based on the use of a low voltage or low current power supply for a wireless module. Voltage step-up, amplification or charging circuitry is used to charge a firing capacitor prior to blasting. This approach does provide protection against directly connecting a wireless detonator battery to an initiating element but remains dependent on the circuitry not charging the firing capacitor inadvertently. This is an adverse safety factor.
  • US201017041 1A1 is concerned with a military wireless initiation system for firing electrical detonators immediately upon receipt of a firing command. Use is made of dual processors, in a receiver, which are responsive to signals transmitted wirelessly from a control unit. These guard against inadvertent initiation due to failure of a single processor. However the system does not include a facility for delaying the initiation of detonators relative to the receipt of a fire command and the receiver is not suitable for deployment in a blast hole. The system appears to use radio frequency rather than magnetic communications and its capability of communicating through rock is severely compromised.
  • An object of the present invention is to provide a wireless blasting module of enhanced capabilities.
  • the invention provides a wireless blasting module which includes a receiver which, in response to at least one magnetic control signal transmitted in a wireless manner from a control device, produces at least one output signal, at least first and second processors which process the at least one output signal, an energy source, terminals to which a detonator component is connectable and a switching arrangement which is operative in response to a predetermined processing relationship between the first and second processors thereby to connect the energy source to the terminals.
  • the detonator component may be a detonator, or an igniter for a detonator.
  • the use of a magnetic control signal provides an enhanced capability of establishing effective communication through a body of rock.
  • the receiver, in the wireless blasting module, may thus be deployed inside a blast hole.
  • the blasting module may include a timer which executes a timing interval of predetermined duration.
  • the duration of the timing interval may be variable and may be programmed into the module using any suitable technique.
  • the duration of the timing interval may be programmed by means of a suitable command from the control device by coupling a control signal to the module at the time of deployment of the blasting module in a blast hole.
  • the wireless blasting module may include a delay timer which inhibits the module from going into an operative mode in which blasting is possible for a period which is commenced after deployment of the module in a blast system.
  • Forward error correction techniques or any other cryptographic or coding or communication system may be employed to improve reliability of transmission of the control signal and hence to guard against unintended initiation.
  • the receiver may be responsive to a plurality of control signals which are repeated at intervals and which contain substantially the same information but which include time-related information which enables successive signals to be differentiated from one another.
  • At least one of the processors may include an oscillator.
  • the oscillator may be a crystal or ceramic resonator or RC oscillator. The oscillator is calibrated close to actual blasting time to avoid drift, ideally in response to a command signal from the control device.
  • Each processor may be controlled by the same oscillator. Alternatively each processor includes a dedicated oscillator.
  • the energy source may include a battery.
  • An energy storage device such as a capacitor may be chargeable by the battery to accumulate sufficient energy for reliable initiation of a detonator.
  • the module may include at least one unique identifier. This may be in any suitable form and in this connection use may be made of a bar-coded system, an rfid or any other suitable mechanism or technique. At least one processor may store a unique identifier. The identifier may be assigned to the module under factory conditions or on site.
  • the quantity of power available at the receiver is low and communication from the wireless blasting module, positioned inside a borehole, cannot readily and reliably be effected as a result of signal attenuation by the surrounding rock mass.
  • use of the module must be based on the premise that reliable one-way communication from an external controller to the receiver, deployed in a blast hole, can be achieved.
  • a magnetic control signal which has the capability of propagating, at least to some extent, through a body of rock; the use of redundancy techniques such as repeated transmission of commands; and the detection and elimination of errors in a signal received by the receiver - an aspect which can be addressed to some extent at least by use of forward error correction codes and similar techniques.
  • the capability of transmitting in a reliable manner from an external controller to the receiver, deployed in a blast hole means that a user-settable time delay can be assigned to the blasting module in an effective and reliable manner.
  • Figure 1 is a schematic representation of a wireless blasting module according to one form of the invention.
  • Figure 2 illustrates a possible physical relationship between the module and a detonator and booster
  • FIG. 3 illustrates an established blasting system.
  • FIG. 1 of the accompanying drawings illustrates in block diagram form a circuit arrangement of a wireless blasting module 10 according to the invention.
  • the module includes an antenna 12, a receiver/amplifier 14, a filter 16, first and second processors 18 and 20 respectively, a capacitor 24, a battery 26 and a switching arrangement 28 connected to output terminals 30.
  • a detonator or a detonator igniter of any appropriate construction, not shown, is connected to the terminals.
  • Each processor may be of any suitable kind and for example may be a microprocessor, an application-specific integrated circuit (ASIC), FPGA, custom- designed logic or the like.
  • the processors may be physically separate from each other. Alternatively the processors are contained in the same package or are on the same silicon die.
  • the timing of each processor is controlled by an internal RC oscillator respectively dependent on (i.e. calibrated from) externally connected crystals 34 and 36. Such calibration techniques are known in the art.
  • Each RC oscillator is used during a timing interval countdown to make the system insensitive to mechanical shock, for example from adjacent explosions that may influence the crystal oscillators.
  • the antenna 12 is a multi-directional device and modulation techniques and frequencies are chosen, as appropriate, for the specific application.
  • the receiver 14 operates at a low frequency using through-the-earth magnetic communication techniques and pulse code modulation as are described, for example, in Microchip Application Note AN232.
  • the receiver employs automatic gain techniques and strips noise through the use of filtering techniques implemented by means of analogue circuitry, through the use of DSP techniques implemented by means of digital circuitry, or by suitable software or firmware.
  • the output of the receiver 14, suitably amplified, is coupled, after passing through the filter 16, to each processor 18 and 20.
  • the switching arrangement 28 includes field effect transistors 40 and 42 which are respectively connected to outputs from the processors 18 and 20 and which are used to control discharge of the capacitor through a detonator or igniter connected to the terminals 30.
  • the module 10 is contained in a suitable housing 50 which carries a small eyelet or hook 52.
  • the detonator component used e.g. a detonator 54 embedded in a booster explosive 56, is attached to the housing 50 in any appropriate way.
  • a cord, not shown, attached to the eyelet or hook is used as a suspension arrangement whereby the combination of the module and the booster can be lowered into a blast hole at a blasting site.
  • the housing 50 protects the module 10 from the ingress of liquids and against mechanical shock.
  • FIG. 3 shows a blast site 60 which includes a plurality of boreholes 62.
  • a control device 64 is connected to an output antenna 66 which is looped around the blast site and the boreholes.
  • the control device which controls the blasting process, includes a processor 68, a display 70, a keyboard or any other input device 72 connected to the processor, a key input 74 without which the processor is inoperative, a transmitting amplifier 76 which is connected to the loop antenna 66 and a radio frequency transmitter/receiver 78 for communication purposes with other blasting equipment via an antenna 80.
  • Each borehole 62 contains explosive material and one or more blasting modules with attendant detonators and boosters, according to requirement.
  • Each module is supplied to a user point in a non-powered state. Typically the module is supplied with the battery 26 separate from the other components.
  • the battery 26 may be disconnected from the remainder of the circuit electronically or by means of a physical switch. Alternatively the battery may be attached to the remainder of the module by a user. A battery pull tab could be used to connect the battery to a circuit or a switch in the module could be activated, when necessary, by a user.
  • a printed barcode, rfid or an internal identifier stored in one or both of the processors is used for tracking purposes.
  • the identifier which is assigned to the module may be unique for a particular blast and may be assigned by a programmer. Alternatively the identifier may be unique in an absolute sense and may be an identifier which is supplied under factory conditions.
  • the module 10 optionally includes a programming connector 82.
  • a programming connector 82 By connecting a suitable programming unit to the connector an electronic latching switch can be activated to power the module. It is also possible to activate the module using a radio or magnetic signal but this is less desirable for the capability of activation over a distance inherently reduces the safety characteristics of the module.
  • Firing time information for the module is supplied to the programming connector 80 by means of a programming machine. This can happen at any appropriate time before a fire command is sent to the module.
  • the firing time (delay time) could be pre-programmed in a factory environment.
  • Commands which are sent via the programming connector 82 make use of appropriate acknowledgement and cyclic redundancy checks to ensure proper receipt of the commands.
  • delay time information originated from a programming machine, is supplied to the module in a wireless manner, for example from the control device 64 to the receiver 14 using a magnetic signal - this can be done reliably and effectively using a magnetic signal which can propagate through a rock body even once the module has been deployed in a blast hole.
  • As communication between the control unit and the module is in one direction only each signal which is transmitted to the module should make use of forward error correction techniques. Alternatively or additionally each signal should be repeated at least once to enhance reliability.
  • each processor controls a separate, series-connected fire switch i.e. the transistors 40 and 42 respectively which are in series with the energy storage capacitor 24.
  • commands between the processors 18 and 20 must be validated.
  • a communications link 90 between the processors enables each processor to verify the state of the other processor.
  • Another technique requires the removal of a controlled electrical short circuit over the output of the capacitor 24.
  • each processor may be required for each processor so that each processor produces a predetermined output signal which leads to firing of the detonator.
  • the commands are preferably suitably encoded but the use of a preamble, forward error correction and a cyclic redundancy check is desirable to ensure reliable command reception.
  • a command transmitted by the control device 64 is repeated at least once but preferably a number of times. When this occurs each successive command is identical to a preceding command but contains time information to enable the command to be distinguished from the preceding command.
  • four identical ARM commands may be transmitted at spaced time intervals.
  • four FIRE commands may be transmitted in succession at fixed time intervals.
  • the FIRE commands may be distinguished from one another by means of information stored in the processors beforehand. For example a first fire command may be "FIRE + 3"; a second fire command may be "FIRE + 2"; a third fire command may be "FIRE + 1 "; and a fourth fire command may be "FIRE".
  • Receipt of any of these commands suitably interpreted by one or both processors means that firing must take place after three delay periods, two delay periods, one delay period, and zero delay period, as the case may be.
  • the fire commands thus contain data relating to an offset time to be added to a countdown sequence upon reception.
  • By modifying the offset time which is sent with each successive fire command receipt of any one fire command results in an accurate execution thereof i.e. in an accurately timed firing event.
  • substantially identical arm commands can be distinguished from each other.
  • substantially identical START_CALIBRATE and STOP CALIBRATE commands may respectively be distinguished from each other.
  • At least one of the processors 18 and 20 includes a software timer which generates a delay period during which detonator firing is prohibited and prevented. This can be done by directly connecting the terminals 30 to each other or by introducing an open circuit into the firing circuit, during the deployment period. A similar safeguard can be achieved by making use of a hardware delay timer.
  • the detonator uses a fuse as an initiation element then the resistance of the fuse may be tested and reported to the programming unit which is connected to the programming connector 82, during an installation phase. Other self-tests and diagnostic tests such as the voltage of the battery 26, firmware revisions and checksums of firmware and cyclic redundancy checks, can also be implemented. If the detonator is electronic, commands may be sent to the detonator to establish the status and efficacy of the electronic detonator.
  • the module preferably enters a low power state after a user-settable time delay if no wireless commands are received.
  • the receiver circuit may optionally be turned off at the same time.
  • the receiver 14 is powered for a user-settable period during which the receiver is responsive to a signal from the control device. This technique helps to conserve energy consumption. Receipt of a control signal during a powered interval might act to postpone a following sleep period or, equivalently, extend the powered interval - this is useful for example if a blast is to be commenced or a sequence of commands is to be sent to the modules and, during that interval, the modules must be responsive to all commands.
  • the control device may also be operable to transmit a disarm command which operates in a similar manner to place the module in a safe state.
  • Commands to the processors may be repeated to enhance reliability and forward error correction techniques may be employed, as appropriate.
  • each module/detonator assembly Prior to each module/detonator assembly being placed in a blast hole a user connects each module to the programming unit to enable the module.
  • the programming unit supplies the module with a fire command which is unique to the given blast, and a firing time.
  • Each blast hole is loaded with explosive, as desired, and one or more modules are placed in each blast hole.
  • the wire loop antenna 66 is placed around the blast zone (panel) and is connected to the control unit (blasting machine) which is in a safe location.
  • the control device possibly under the control of a wired or wireless blast coordinating machine which is communication with the control unit, supplies an appropriate sequence of commands which, as indicated, may include a sequence of ARM commands followed by a sequence of FIRE commands.
  • Each processor upon receipt of a first validated FIRE command, adds the supplied fire offset, in the FIRE command, to a local firing time and commences an adjusted firing countdown sequence. After receipt of one validated FIRE command no further wireless commands are processed.
  • the antenna 2 and receiver 4 can be clamped to prevent interference that may occur during the blasting sequence.
  • the FIRE command includes a cryptographically secure blast identifier that must match an identifier previously loaded into the module via the programming connector 82 for the FIRE command to be considered as valid. In this way separate blasts may be programmed with different blast identifiers and initiated at different times by the control unit.
  • the FIRE command which is required for initiation is supplied to the detonator by the programming unit which is connected to the programming connector. This allows the detonators to be shipped with no valid FIRE command.
  • Another possibility is for the FIRE command to be randomly generated on site on a per blast basis using any suitable technique such as a cryptographically secure, pseudo random number generator in the programming unit.
  • the loop 66 may be tuned manually or automatically using appropriate techniques in order to achieve an appropriate output level so that effective coupling to the wireless detonator modules results.
  • One such technique is to switch appropriately valued capacitors into an effective LC loop resonant circuit.
  • the required output voltage or power of the loop 66 may be calculated based on the depth of the wireless blasting modules, the expected attenuation due to the rock medium being blasted, a safety factor and the minimum receiver level required by the wireless blasting modules. This can be used as the basis for a "go/no-go" decision as to whether the modules will all satisfactorily receive the signal to blast. This is an important criterion as the communication to the detonators is unidirectional.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Selective Calling Equipment (AREA)

Abstract

L'invention concerne un module de commande d'explosion sans fil comprenant un double processeur (18, 20) qui traite un signal de sortie, produit en réaction à la réception d'un signal de commande magnétique, pour commander la connexion d'une source d'énergie (26) à un composant détonateur (DET).
PCT/ZA2011/000072 2010-11-04 2011-09-23 Module de commande d'explosion sans fil WO2012061850A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2012101113A AU2012101113A4 (en) 2010-11-04 2011-09-23 Wireless blasting module

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2010/07921 2010-11-04
ZA201007921 2010-11-04

Related Child Applications (1)

Application Number Title Priority Date Filing Date
AU2012101113A Division AU2012101113A4 (en) 2010-11-04 2011-09-23 Wireless blasting module

Publications (1)

Publication Number Publication Date
WO2012061850A1 true WO2012061850A1 (fr) 2012-05-10

Family

ID=44947269

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2011/000072 WO2012061850A1 (fr) 2010-11-04 2011-09-23 Module de commande d'explosion sans fil

Country Status (2)

Country Link
AR (1) AR083778A1 (fr)
WO (1) WO2012061850A1 (fr)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104406469A (zh) * 2014-10-15 2015-03-11 上海无线电设备研究所 一种激光引信信号处理电路及其信号处理方法
WO2015143502A1 (fr) * 2014-03-27 2015-10-01 Orica International Pte Ltd Appareil, système et procédé de dynamitage
WO2015143501A1 (fr) * 2014-03-27 2015-10-01 Orica International Pte Ltd Appareil, système et procédé de sautage à l'aide d'un signal de communication magnétique
WO2015199620A1 (fr) * 2015-09-16 2015-12-30 Orica International Pte Ltd Dispositif d'amorçage sans fil
WO2015161326A3 (fr) * 2014-04-16 2016-02-25 Detnet South Africa (Pty) Limited Procédé d'obtention d'informations sismiques
EP3367051A3 (fr) * 2013-12-02 2018-11-28 Austin Star Detonator Company Procédés de décapage sans fil
WO2020176939A1 (fr) * 2019-03-04 2020-09-10 Voyager Innovations Pty Ltd Système de détonation sans fil
WO2020263193A1 (fr) * 2019-06-27 2020-12-30 Orica International Pte Ltd Systèmes de dynamitage commerciaux
CN112346112A (zh) * 2020-09-18 2021-02-09 中国石油天然气集团有限公司 井炮遥爆系统扩容装置、方法及井炮遥爆系统
WO2021222947A1 (fr) * 2020-04-29 2021-11-04 Detnet South Africa (Pty) Ltd Ensemble détonateur sans fil
CN114279281A (zh) * 2022-01-18 2022-04-05 北京伊拜科技有限责任公司 一种无线雷管起爆网路的起爆控制方法
WO2022246481A1 (fr) * 2021-05-20 2022-11-24 Detnet South Africa (Pty) Ltd Appareil destiné à être utilisé dans un système de détonateur sans fil
CN115790298A (zh) * 2022-10-31 2023-03-14 维纳芯科技(无锡)有限公司 一种用于地勘电子雷管的电子控制模块及起爆控制方法

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4685396A (en) 1984-09-04 1987-08-11 Imperial Chemical Industries Plc Method and apparatus for safer remotely controlled firing of ignition elements
US4884506A (en) * 1986-11-06 1989-12-05 Electronic Warfare Associates, Inc. Remote detonation of explosive charges
US6105688A (en) * 1998-07-22 2000-08-22 Schlumberger Technology Corporation Safety method and apparatus for a perforating gun
US20040196605A1 (en) * 2003-02-04 2004-10-07 Don Dinn Passive inductive switch
US20080083344A1 (en) * 2005-11-14 2008-04-10 Deguire Daniel R Safe and arm system for a robot
US20080227390A1 (en) * 2007-03-16 2008-09-18 Magneto-Inductive Systems Limited Method and system for relaying signals from a magneto-inductive system through a voice-band system
US20080307993A1 (en) 2004-11-02 2008-12-18 Orica Explosives Technology Pty Ltd Wireless Detonator Assemblies, Corresponding Blasting Apparatuses, and Methods of Blasting
US20100170411A1 (en) 2006-09-19 2010-07-08 Mas Zengrange (Nz) Ltd Remote initiator for the remote initiation of explosive charges

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4685396A (en) 1984-09-04 1987-08-11 Imperial Chemical Industries Plc Method and apparatus for safer remotely controlled firing of ignition elements
US4884506A (en) * 1986-11-06 1989-12-05 Electronic Warfare Associates, Inc. Remote detonation of explosive charges
US6105688A (en) * 1998-07-22 2000-08-22 Schlumberger Technology Corporation Safety method and apparatus for a perforating gun
US20040196605A1 (en) * 2003-02-04 2004-10-07 Don Dinn Passive inductive switch
US20080307993A1 (en) 2004-11-02 2008-12-18 Orica Explosives Technology Pty Ltd Wireless Detonator Assemblies, Corresponding Blasting Apparatuses, and Methods of Blasting
US20080083344A1 (en) * 2005-11-14 2008-04-10 Deguire Daniel R Safe and arm system for a robot
US20100170411A1 (en) 2006-09-19 2010-07-08 Mas Zengrange (Nz) Ltd Remote initiator for the remote initiation of explosive charges
US20080227390A1 (en) * 2007-03-16 2008-09-18 Magneto-Inductive Systems Limited Method and system for relaying signals from a magneto-inductive system through a voice-band system

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3367051A3 (fr) * 2013-12-02 2018-11-28 Austin Star Detonator Company Procédés de décapage sans fil
US11009331B2 (en) 2013-12-02 2021-05-18 Austin Star Detonator Company Method and apparatus for wireless blasting
EP3553459A1 (fr) * 2013-12-02 2019-10-16 Austin Star Detonator Company Procédés de dynamitage sans fil
US10429162B2 (en) 2013-12-02 2019-10-01 Austin Star Detonator Company Method and apparatus for wireless blasting with first and second firing messages
JP2017512968A (ja) * 2014-03-27 2017-05-25 オリカ インターナショナル プライベート リミティド 装置、システムおよび方法
WO2015143501A1 (fr) * 2014-03-27 2015-10-01 Orica International Pte Ltd Appareil, système et procédé de sautage à l'aide d'un signal de communication magnétique
JP2017510785A (ja) * 2014-03-27 2017-04-13 オリカ インターナショナル プライベート リミティド 装置、システムおよび方法
WO2015143502A1 (fr) * 2014-03-27 2015-10-01 Orica International Pte Ltd Appareil, système et procédé de dynamitage
EP3123103A4 (fr) * 2014-03-27 2017-11-01 Orica International Pte Ltd Appareil, système et procédé de sautage à l'aide d'un signal de communication magnétique
EP3123104A4 (fr) * 2014-03-27 2017-11-01 Orica International Pte Ltd Appareil, système et procédé de dynamitage
US10113843B2 (en) 2014-03-27 2018-10-30 Orica International Pte Ltd Apparatus, system and method for initiation of buried explosives
AU2015234603B2 (en) * 2014-03-27 2020-01-02 Orica International Pte Ltd Apparatus, system and method for blasting
US10295323B2 (en) 2014-03-27 2019-05-21 Orica International Pte Ltd. Apparatus, system and method for blasting using magnetic communication signal
RU2697980C2 (ru) * 2014-03-27 2019-08-21 Орика Интернэшнл Пте Лтд Аппарат, система и способ
AU2015234708B2 (en) * 2014-03-27 2020-01-02 Orica International Pte Ltd Apparatus, system and method for blasting using magnetic communication signal
US20170074630A1 (en) * 2014-03-27 2017-03-16 Orica International Pte Ltd Apparatus, System And Method For Blasting Using Magnetic Communication Signal
RU2710580C2 (ru) * 2014-03-27 2019-12-27 Орика Интернэшнл Пте Лтд Аппарат, система и способ
WO2015161326A3 (fr) * 2014-04-16 2016-02-25 Detnet South Africa (Pty) Limited Procédé d'obtention d'informations sismiques
CN104406469A (zh) * 2014-10-15 2015-03-11 上海无线电设备研究所 一种激光引信信号处理电路及其信号处理方法
WO2015199620A1 (fr) * 2015-09-16 2015-12-30 Orica International Pte Ltd Dispositif d'amorçage sans fil
EA037944B1 (ru) * 2015-09-16 2021-06-10 Орика Интернэшнл Пте Лтд Беспроводное устройство инициирования
AU2015280721B2 (en) * 2015-09-16 2021-07-22 Orica International Pte Ltd A wireless initiation device
AU2015280721C1 (en) * 2015-09-16 2022-10-27 Orica International Pte Ltd A wireless initiation device
US11248895B2 (en) 2015-09-16 2022-02-15 Orica International Pte Ltd Wireless initiation device
WO2020176939A1 (fr) * 2019-03-04 2020-09-10 Voyager Innovations Pty Ltd Système de détonation sans fil
US11867493B2 (en) 2019-03-04 2024-01-09 Voyager Innovations Pty Ltd Wireless detonation system
AU2020230556B2 (en) * 2019-03-04 2022-02-17 Voyager Innovations Pty Ltd Wireless detonation system
CN113544461A (zh) * 2019-03-04 2021-10-22 航行者创新私人有限公司 无线引爆系统
WO2020263193A1 (fr) * 2019-06-27 2020-12-30 Orica International Pte Ltd Systèmes de dynamitage commerciaux
CN114342285A (zh) * 2019-06-27 2022-04-12 澳瑞凯国际有限公司 商业爆破系统
US12078467B2 (en) 2019-06-27 2024-09-03 Orica International Pte Ltd Commercial blasting systems
WO2021222947A1 (fr) * 2020-04-29 2021-11-04 Detnet South Africa (Pty) Ltd Ensemble détonateur sans fil
US11874098B2 (en) 2020-04-29 2024-01-16 Detnet South Africa (Pty) Ltd Wireless detonator assembly
CN112346112A (zh) * 2020-09-18 2021-02-09 中国石油天然气集团有限公司 井炮遥爆系统扩容装置、方法及井炮遥爆系统
CN112346112B (zh) * 2020-09-18 2024-05-28 中国石油天然气集团有限公司 井炮遥爆系统扩容装置、方法及井炮遥爆系统
WO2022246481A1 (fr) * 2021-05-20 2022-11-24 Detnet South Africa (Pty) Ltd Appareil destiné à être utilisé dans un système de détonateur sans fil
CN114279281A (zh) * 2022-01-18 2022-04-05 北京伊拜科技有限责任公司 一种无线雷管起爆网路的起爆控制方法
CN114279281B (zh) * 2022-01-18 2023-03-21 北京伊拜科技有限责任公司 一种无线雷管起爆网路的起爆控制方法
CN115790298A (zh) * 2022-10-31 2023-03-14 维纳芯科技(无锡)有限公司 一种用于地勘电子雷管的电子控制模块及起爆控制方法
CN115790298B (zh) * 2022-10-31 2023-11-14 维纳芯科技(无锡)有限公司 一种用于地勘电子雷管的电子控制模块及起爆控制方法

Also Published As

Publication number Publication date
AR083778A1 (es) 2013-03-20

Similar Documents

Publication Publication Date Title
WO2012061850A1 (fr) Module de commande d'explosion sans fil
AU2021254605B2 (en) A wireless initiation device
KR100616806B1 (ko) 개별 지연된 뇌관들로 된 발파 회로의 기폭 시스템
US7975612B2 (en) Constant-current, rail-voltage regulated charging electronic detonator
CA2645206C (fr) Relais d'amorcage sans fil et procedes d'abattage a l'explosif
ES2335101T3 (es) Procedimiento para identificar un dispositivo esclavo desconocido o no marcado tal como en un sistema de voladura electronico.
KR20010031865A (ko) 기폭물질을 기폭시키기 위한 제어식 전자유도 기폭시스템
US5159149A (en) Electronic device
US20230296364A1 (en) Improved communications in electronic detonators
US11105600B1 (en) Identification method in a detonator network
AU2012393032B2 (en) Remote initiator receiver
CN105066802A (zh) 遥控起爆系统
AU2016354618B2 (en) Wireless detonator
JP2019066091A (ja) 起爆雷管
US20050011390A1 (en) ESD-resistant electronic detonator
AU2012101113A4 (en) Wireless blasting module
US7337723B2 (en) Detonator arming
WO2006055991A1 (fr) Detonateur
AU2021264989A1 (en) Wireless detonator assembly
AU2021294336B2 (en) Improved communications in electronic detonators
AU2002100859A4 (en) Electronic detonator buffered connection device
MXPA00004358A (es) Sistema de detonacion por induccion electromagnetica controlada para la iniciacion de un material detonable

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11782356

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11782356

Country of ref document: EP

Kind code of ref document: A1