CN114646243B - Digital detonator initiation control method and system for improving safety - Google Patents

Digital detonator initiation control method and system for improving safety Download PDF

Info

Publication number
CN114646243B
CN114646243B CN202210490824.6A CN202210490824A CN114646243B CN 114646243 B CN114646243 B CN 114646243B CN 202210490824 A CN202210490824 A CN 202210490824A CN 114646243 B CN114646243 B CN 114646243B
Authority
CN
China
Prior art keywords
detonator
detonation
information
code
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210490824.6A
Other languages
Chinese (zh)
Other versions
CN114646243A (en
Inventor
王元康
孟伟斌
胡南奇
张闻义
袁顺芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Hangxin Technology Co ltd
Original Assignee
Zhejiang Hangxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Hangxin Technology Co ltd filed Critical Zhejiang Hangxin Technology Co ltd
Priority to CN202210490824.6A priority Critical patent/CN114646243B/en
Publication of CN114646243A publication Critical patent/CN114646243A/en
Application granted granted Critical
Publication of CN114646243B publication Critical patent/CN114646243B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C19/00Details of fuzes
    • F42C19/08Primers; Detonators
    • F42C19/12Primers; Detonators electric
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C19/00Details of fuzes
    • F42C19/08Primers; Detonators

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the technical field of digital detonator control, and particularly discloses a digital detonator initiation control method and system for improving safety, wherein the method comprises the following steps: inputting an operator ID number and a password through the APP, logging in the initiator, and uploading identity information of the initiator to the cloud server; combining the detonation password, the digital detonator UID code, the digital detonator shell code and the detonation password into a working code, checking the working code with an authorization code, and if the checking is wrong, failing to detonate; after checking, APP sends authorization file to exploder, after digital detonator online networking nondestructive testing, digital detonator is charged, exploder explodes, and electronic switch disconnects physical bus; and recording detonation time, UID codes of the online detonators, longitude and latitude, blasting operator information, detonating article information and post-explosion counting information to form blasting record information and uploading the blasting record information to a cloud server. The data of each detonator can be ensured to be searched, the safety is higher, the accident responsibility can be conveniently searched, and the stability of society is maintained.

Description

Digital detonator initiation control method and system for improving safety
Technical Field
The invention belongs to the technical field of digital detonator control, and particularly relates to a digital detonator initiation control method and system for improving safety.
Background
The digital detonator has been used in mine blasting engineering, tunnel underground blasting engineering, demolition blasting, underwater blasting, and complex environment control blasting. The digital detonator is adopted to effectively control the hazard effect of blasting vibration and improve the blasting crushing effect; meanwhile, the pre-splitting blasting is adopted, so that the intensity of blasting vibration can be better controlled: in addition, by optimizing the millisecond delay interval time, low-frequency seismic waves can be converted into uniformly distributed high-frequency seismic waves, so that the effective control of blasting vibration hazard is realized. The existing digital electronic detonators are various due to production or use reasons, but are classified into two types according to the detonation process:
the digital detonator without energy storage and detonation function needs the energy storage function of the detonator, and the energy storage module of the detonator is used for discharging and detonating the digital detonator. Because of the importance and the danger of coal mine blasting, gas explosion is prevented, and therefore, the used digital detonator does not have an energy storage function and needs an exploder to be detonated by energy.
The digital detonator with the small-capacity energy storage detonating function is characterized in that before detonating, the energy storage module of the digital detonator is charged and stored by the detonator, the detonator sends a detonating command, and when the digital detonator is read, the energy storage module releases energy to detonate the digital detonator.
However, after the detonator explodes, the source of the detonator cannot be tracked, the use mode of the detonator cannot be standardized, and serious accidents caused by the detonation of criminals or carelessness and illegal operation of practitioners cannot be prevented, so that the stability of society is jeopardized.
Disclosure of Invention
The invention aims to provide a digital detonator initiation control method and system for improving safety, which can solve the technical problem that the source cannot be tracked due to the fact that the detonator is not used normally.
The invention provides a digital detonator initiation control method for improving safety, which comprises the following steps:
s1, inputting an operator ID number and a password through an APP, logging in an initiator, and uploading identity information of the initiator to a cloud server;
s2, combining the detonation password, the digital detonator UID code and the digital detonator shell code into a working code, checking the working code with an authorization code, and failing to detonate if the checking is wrong;
s3, after checking, the APP sends an authorization file to the exploder, after online networking of the digital detonator is carried out, nondestructive detection is carried out, the digital detonator is charged, the exploder explodes, and the electronic switch is disconnected with the physical bus;
and S4, after detonation is completed, the detonation time, UID codes of the online detonators, longitude and latitude, blasting operator information, detonating article information and post-detonation checking information are recorded to form blasting record information and the blasting record information is uploaded to the cloud server.
Preferably, the S1 specifically includes: the method comprises the steps that an operator ID number and a password are input through a mobile phone APP to log in an exploder, the mobile phone APP collects identity card information of an exploder and performs face recognition, the identity information of the exploder is uploaded to a cloud server, the identity information comprises the identity card information, the face recognition information and the contact mode, and if any one of the identity information is not matched, the exploder cannot detonate.
Preferably, the S2 specifically includes:
calling the GPS positioning of the mobile phone, and if the GPS positioning module of the initiator is not in the detonation-allowed area, failing to detonate;
calling the GPS positioning of the mobile phone, and when the GPS positioning module of the initiator is in a detonation inhibition area, failing to detonate;
the Bluetooth of the mobile phone is not connected with the initiator, so that the initiation cannot be performed.
Preferably, the S2 further includes: key information of detonation date, detonation position and detonation password is extracted from the authorization code, and is compared, and the detonation is allowed to be initiated by the detonator after the comparison is successful.
Preferably, the synthesizing working code in S2 specifically includes: the digital detonator UID code is 13 bytes, the digital detonator shell code is 13 bytes, the detonation password is 8 bytes, the detonation password, the digital detonator UID code and the digital detonator shell code are bound, and the SAM card key is used for forming a working code without human intervention and automatic encryption.
Preferably, the step S3 specifically includes: the mobile phone and the exploder communicate through Bluetooth, the exploder receives the authorization file, and the exploding password of each detonator is extracted and stored.
Preferably, before the broadcasting initiation in S3, the method further includes the following steps:
1) A mode switching instruction is sent to switch to a registration mode;
2) Only a single detonator leg wire is connected, a bus power supply instruction is sent, and the bus AB voltage is 12V at the moment;
3) Waiting for 100ms after power supply, sending a command for acquiring detonator configuration information, acquiring UID length, detonation password length and version information used by the detonator, and performing error prompt when the read configuration information does not meet the requirements, and ending the flow;
4) Sending a scanning instruction, acquiring the UID and state information of the detonator, recording the UID in the initiator, and checking whether the state information is correct;
5) Transmitting a command for writing the delay value and the hole position value, addressing by using the UID, and writing the delay value and the hole position value of the detonator;
6) Transmitting a reading delay value and a hole position value instruction, reading the corresponding value written before, and confirming that the writing is successful;
7) And sending a bus power-off instruction.
Preferably, in S3, the online networking of the digital detonator specifically includes:
1) The bus is connected, a mode switching instruction is sent, the mode of the module is set to be a networking mode, and the bus is continuously powered for 16V at the moment;
2) After the bus is powered for a period of time, 3 discharging instructions are sent, and the interval is at least 10ms; 3 times of detonator initialization instructions are sent, and the interval is at least 500ms;
3) Transmitting an instruction for acquiring detonator configuration information, and acquiring UID length, detonation password length and version information used by the detonator;
4) Transmitting an instruction for writing the delay value and the hole position value, and writing the delay value and the hole position value one by one according to the UID registered by the scanning code;
5) Transmitting a UID read state clearing instruction, continuously transmitting a scanning instruction until all on-net detonators are scanned out or 10 continuous times of reply data are all 0, determining that all registered detonators are on the net, and detecting state bit information of each detonator under the condition of no broken line;
the state bit information of the initial detonator is 0x00, if the delay value and the hole position value obtained by detonator scanning are not consistent with the written value in the step 4), the step 4) is re-executed on the inconsistent detonator, and then the step 5) is re-executed on all the detonators;
6) If the detonator is not scanned out or is scanned to an unregistered detonator, sending state information of the reading delay value and the hole position value instruction roll call confirmation detonator, or repeatedly executing the step 5);
7) And sending a delay calibration instruction to perform broadcast delay calibration.
Preferably, the specific step of detonating the initiator in S3 includes:
a) Sending a detonation password verification instruction, and verifying the detonation passwords of all detonators;
b) Transmitting a state instruction for clearing UID read, continuously transmitting a scanning instruction until all network-on detonators are scanned out or 10 continuous times of reply data are all 0, determining that all current detonators are still on the network without wire breakage, and detecting state bit information, delay and hole site value information of each detonator;
c) If the detonator is not scanned out or the unregistered detonator is scanned out, sending a reading delay value and a hole position value instruction roll call to confirm the state information of the detonator or rescanning;
d) If the step b is correctly performed and the steps are correctly performed, then if a command for reading the delay value and the hole position value is sent, the read detonator state bit information is 0x0D;
e) B, when the state bit scanned in the step B shows that the calibration is unsuccessful, confirming delay time, then sending a delay calibration instruction, and carrying out broadcast delay calibration;
f) B, when the scanned status bit in the step b shows that the verification of the detonation password is unsuccessful, confirming the detonation password, re-executing the step a, and sending the detonation password corresponding to the primer which is not verified;
g) And sending a reading delay value and hole position value instruction according to the detonator UID with all the status bit errors. Reading the state bits of the detonators again, if the state bits are still wrong, sending 3 discharge instructions, and sending 3 detonator reset instructions; removing the detonator with problems, and then carrying out networking initiation process again;
h) Sending a charging 22v instruction, and performing high-voltage charging to prepare for detonation;
i) And sending a verification and initiation instruction, verifying all detonator states, entering initiation delay if all detonator states are normal, and initiating when the delay time is reached.
The invention also provides a digital detonator detonation control system for improving safety, which is used for realizing the steps of the digital detonator detonation control method for improving safety, and comprises the following steps:
the APP inputs an operator ID number and a password to log in the initiator, and the identity information of the initiator is uploaded to the cloud server; combining the operation code, the digital detonator UID code, the digital detonator shell code and the detonation code into a working code, checking the working code with an authorization code, and if the checking is wrong, the detonation cannot be performed; after checking, the APP sends an authorization file to the initiator;
the server is used for recording the detonation time, UID codes of the online detonators, longitude and latitude, blasting operator information, detonating article information and post-detonation counting information after the detonation is completed;
and the exploder is used for charging the digital detonator after the digital detonator is online and is subjected to nondestructive testing, the exploder explodes, and the electronic switch is disconnected with the physical bus.
Compared with the prior art, the digital detonator initiation control method and system for improving safety, provided by the invention, comprise the following steps: inputting an operator ID number and a password through the APP, logging in the initiator, and uploading identity information of the initiator to the cloud server; combining the detonation password, the digital detonator UID code, the digital detonator shell code and the detonation password into a working code, checking the working code with an authorization code, and if the checking is wrong, failing to detonate; after checking, APP sends authorization file to exploder, after digital detonator online networking nondestructive testing, digital detonator is charged, exploder explodes, and electronic switch disconnects physical bus; and after the detonation is completed, recording detonation time, UID codes of the online detonators, longitude and latitude, blasting operator information, detonation article information and post-detonation counting information to form blasting record information and uploading the blasting record information to a cloud server. And by arranging multiple technical measures, the safe detonation of the digital detonator is ensured. And generating detailed detonation information records and uploading the information of the mobile phone APP end password function, face recognition, GPS positioning detonation discrimination, bluetooth communication discrimination, three-code-in-one working code right discrimination, authorization document discrimination, digital detonator single shot detection, digital detonator network and digital detonator detonation control to a cloud server. The data of each detonator can be checked, the safety is higher, the accident responsibility can be conveniently checked, the serious accidents caused by the detonation of the detonator by criminals or the negligence and illegal operation of practitioners can be effectively prevented, and the social stability is jeopardized.
Drawings
FIG. 1 is a flow chart of a digital detonator initiation control method for improving safety;
fig. 2 is a schematic block diagram of a digital detonator initiation control system for improving safety.
Description of the embodiments
The following detailed description of embodiments of the invention is, therefore, to be taken in conjunction with the accompanying drawings, and it is to be understood that the scope of the invention is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the term "comprise" or variations thereof such as "comprises" or "comprising", etc. will be understood to include the stated element or component without excluding other elements or components.
As shown in fig. 1, a digital detonator initiation control method for improving safety according to a preferred embodiment of the present invention comprises the following steps:
s1, inputting an operator ID number and a password through a mobile phone APP to log in an initiator, and uploading identity information of the initiator to a cloud server;
s2, combining the operation code, the digital detonator UID code, the digital detonator shell code and the detonation code into a working code, checking the working code with an authorization code, and if the checking is wrong, the detonation cannot be performed;
s3, after checking, the mobile phone APP sends an authorization file to the exploder, the digital detonator is charged, after online networking nondestructive detection of the digital detonator is completed, broadcasting is initiated, the electronic switch is disconnected with the physical bus, and explosion records are generated and uploaded to the cloud server.
Wherein the initiator processor is a stm32 microprocessor using a freertos real-time operating system and an EMWIN graphical operating interface. The initiator is provided with a Bluetooth communication module, a liquid crystal screen, a matrix keyboard 6*6, a memory, a lithium battery management module, a bar code scanner, a GPS Beidou positioning module, a 485 CAN networking module and other functional modules. The detonator microprocessor is communicated through bus modulation, and at most 500 detonators are connected, and each detonator is sequenced according to the serial numbers 001 and 002-500. The specific operation process is as follows: the mobile phone APP collects identity card information of the detonators, face recognition is carried out, the detonators synthesize the three codes of the operation code, the digital detonator UID tube shell code and the detonation code into a working code, and the working code and the authorization code are checked. The method comprises the steps of charging a digital detonator, performing online networking nondestructive detection on the digital detonator, checking a detonation password, broadcasting detonation, disconnecting a physical bus by an electronic switch, generating and uploading a burst record to a cloud server.
And by arranging multiple technical measures, the safe detonation of the digital detonator is ensured. And generating detailed detonation information records and uploading the information of the mobile phone APP end password function, face recognition, GPS positioning detonation discrimination, bluetooth communication discrimination, three-code-in-one working code right discrimination, authorization document discrimination, digital detonator single shot detection, digital detonator network and digital detonator detonation control to a cloud server.
In a preferred embodiment, the S1 specifically includes: the method comprises the steps that an operator ID number and a password are input through a mobile phone APP to log in an exploder, the mobile phone APP collects identity card information of an exploder and performs face recognition, the identity information of the exploder is uploaded to a cloud server, the identity information comprises the identity card information, the face recognition information and the contact mode, and if any one of the identity information is not matched, the exploder cannot detonate. An operator remotely logs in the initiator through the mobile phone APP, inputs an ID and a password, and cannot log in and detonate if the ID and the password are input incorrectly. And carrying out face recognition after login, and if the face recognition fails, the detonation cannot be carried out.
In a preferred embodiment, S2 specifically includes: calling the GPS positioning of the mobile phone, and if the GPS positioning module of the initiator is not in the detonation-allowed area, failing to detonate; calling the GPS positioning of the mobile phone, and when the GPS positioning module of the initiator is in a detonation inhibition area, failing to detonate; the Bluetooth of the mobile phone is not connected with the initiator, so that the initiation cannot be performed. Any of the above conditions is not satisfied and can not be detonated, so that sufficient safety is ensured.
The exploder detects the integrity of the system parameters of each online digital detonator, checks the operation ID and the operation password of the exploder, and combines with the GPS positioning module of the exploder to judge whether the explosion time and explosion area are correct.
In a further aspect, step S2 further includes: key information of detonation date, detonation position and detonation password is extracted from the authorization code, and is compared, and the detonation is allowed to be initiated by the detonator after the comparison is successful. After the mobile phone and the exploder are communicated through Bluetooth connection, the mobile phone APP can send an authorization file to the exploder, the exploder receives the authorization file, and the explosion password of each detonator is extracted and stored.
In a preferred embodiment, the step S2 of synthesizing the working code specifically includes: the digital detonator UID code is 13 bytes, the digital detonator shell code is 13 bytes, the detonation code is 8 bytes, the three codes are bound, and the SAM card key is used for unmanned intervention and automatic encryption to form a working code.
In a preferred scheme, the method further comprises the following steps before broadcasting initiation in the step S3:
1) A mode switch command is sent to switch to the registration mode (only once).
2) Only a single detonator leg wire is connected, and a bus power supply instruction is sent, wherein the bus AB voltage is 12V.
3) Waiting for 100ms after power supply, sending a command for acquiring detonator configuration information, acquiring UID length, detonation password length and version information used by the detonator, and carrying out error prompt when the read configuration information does not meet the requirements, and ending the flow.
4) And sending a scanning instruction, acquiring the UID, state information and the like of the detonator, recording the UID in the initiator, and checking whether the state information is correct. The status information bit is described in the fourth section 'scan' instruction.
5) And sending a command for writing the delay value and the hole position value, and writing the delay value and the hole position value of the detonator by using UID addressing (optionally, if the current step is not used, writing in the field networking flow).
6) And sending a read delay value and a hole position value instruction, reading the previously written value, and confirming that the writing is successful (optional).
7) And sending a bus power-off instruction.
In a preferred scheme, the online networking of the digital detonator in S3 specifically comprises the following steps:
1) Networking, connecting buses, sending a mode switching instruction, and setting the module mode as a networking mode (only once). The bus is continuously supplied with 16V at this time.
2) After the bus is powered for a period of time, 3 discharging instructions (at least 10ms intervals) are sent, and 3 detonator initialization instructions (at least 500ms intervals) are sent, wherein the instructions have certain requirements on the driving capability of the detonator battery.
3) And sending an instruction for acquiring the configuration information of the detonator, and acquiring the UID length, the detonation password length and the version information used by the detonator. When the version detection fails, the module does not receive other instructions except the power supply/disconnection of the bus in the fourth section, voltage and current acquisition, mode switching, detonator configuration information acquisition, discharging, detonator resetting, detonator initializing, bridge wire on-off measurement and energy storage capacitor measurement.
4) And sending a command for writing the delay value and the hole position value, writing the delay value and the hole position value one by one according to the UID registered by the scanning code, and paying attention to the writing EE time of the detonator (120 ms should be waited after the last command is sent). When using code scanning registration, do so; when wire registration is used, this step may be omitted if the delay value and the hole site value have been written at the time of registration.
5) And sending a state instruction for clearing UID read, continuously sending a scanning instruction until all on-net detonators are scanned out or 10 continuous times of reply data are all 0, determining that all registered detonators are on the net, and detecting state bit information of each detonator under the condition of no wire breakage. The state bit information of the initial detonator should be 0x00, and the state information bit description is shown in a fourth section of 'scanning' instruction. If the delay value and the hole position value obtained by detonator scanning are not consistent with the written value in the step 4, the step 4 should be re-executed for the inconsistent detonators, and then the step 5 should be re-executed for all detonators.
6) If the detonator is not scanned out or the unregistered detonator is scanned out, the state information of the detonator can be confirmed by reading the delay value and the hole position value instruction roll call (if the corresponding delay value and the hole position value are read out, the detonator is on the net, and if the corresponding delay value and the hole position value are not read out, the detonator is not existed). The scan may also be rescanned (repeat step 5).
7) And sending a delay calibration instruction to perform broadcast delay calibration.
The detonation of the initiator is followed, and the method specifically comprises the following steps:
8) And sending an initiation password verification instruction, and verifying the initiation passwords of all detonators. The detonation passwords of the detonators should in principle be different from each other, and all detonation passwords need to be sent one by one. If all detonators write the same detonating code when the three-code binding code is injected, the same detonating code is only needed to be sent once (different detonators are recommended to have mutually exclusive and unique detonating codes, so that the safety is improved).
9) And sending a state instruction for clearing UID read, and then continuously sending a scanning instruction until all network-on detonators are scanned out or 10 continuous times of reply data are all 0, determining that the current detonators are still all on the network without wire breakage, and detecting state bit information, delay and hole site value information of each detonator. If the steps are correctly carried out, the state bit information of the current detonator is 0x0C, the state bits are different, error checking can be correspondingly carried out, and the state information bit description is shown in a fourth section of scanning instruction.
10 If there is a detonator that has not been scanned out or an unregistered detonator has been scanned out, the process is imitated as in step 6.
11 If step 9 is performed correctly, and after the steps are performed correctly, if the instruction of reading delay value and hole position value is sent, the read detonator status bit information should be 0x0D.
12 When the status bit scanned in the step 9 shows that the calibration is unsuccessful, confirming the delay time, and then re-executing the step 7.
13 And 9) when the scanned status bit in the step shows that the verification of the detonation password is unsuccessful, confirming the detonation password, re-executing the step 8, and sending the detonation password corresponding to the primer which is not verified.
14 And sending a reading delay value and hole position value instruction according to the detonator UID with all the status bit errors. And reading the status bits of the detonators again, and if the status bits are wrong, sending 3 discharge instructions and sending 3 detonator reset instructions. And removing the problematic detonator, and then carrying out networking initiation process again.
15 A charging-22 v command is sent, high-voltage charging is carried out, initiation is prepared, charging time is noted, the time is in direct proportion to the number of detonator firing, and the specific time refers to the charging command of section 4.
16 Transmitting verification and initiation instructions, verifying all detonator states, entering initiation delay if all detonator states are normal, and initiating when the delay time is reached.
As shown in fig. 2, the embodiment of the invention further provides a digital detonator initiation control system for improving safety, where the system is used for implementing the steps of the digital detonator initiation control method for improving safety as described above, and the method includes:
the APP inputs an operator ID number and a password to log in the initiator, and the identity information of the initiator is uploaded to the cloud server; combining the operation code, the digital detonator UID code, the digital detonator shell code and the detonation code into a working code, checking the working code with an authorization code, and if the checking is wrong, the detonation cannot be performed; after checking, the APP sends an authorization file to the initiator;
the server is used for recording the detonation time, UID codes of the online detonators, longitude and latitude, blasting operator information, detonating article information and post-detonation counting information after the detonation is completed;
and the exploder is used for charging the digital detonator after the digital detonator is online and is subjected to nondestructive testing, the exploder explodes, and the electronic switch is disconnected with the physical bus.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing descriptions of specific exemplary embodiments of the present invention are presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain the specific principles of the invention and its practical application to thereby enable one skilled in the art to make and utilize the invention in various exemplary embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.

Claims (7)

1. The digital detonator initiation control method for improving the safety is characterized by comprising the following steps of:
s1, inputting an operator ID number and a password through an APP, logging in an initiator, and uploading identity information of the initiator to a cloud server;
s2, combining the detonation password, the digital detonator UID code and the digital detonator shell code into a working code, checking the working code with an authorization code, and failing to detonate if the checking is wrong;
s3, after checking, the APP sends an authorization file to the exploder, after online networking of the digital detonator is carried out, nondestructive detection is carried out, the digital detonator is charged, the exploder explodes, and the electronic switch is disconnected with the physical bus; the broadcasting before detonation in the S3 further comprises the following steps:
1) A mode switching instruction is sent to switch to a registration mode;
2) Only a single detonator leg wire is connected, a bus power supply instruction is sent, and the bus AB voltage is 12V at the moment;
3) Waiting for 100ms after power supply, sending a command for acquiring detonator configuration information, acquiring UID length, detonation password length and version information used by the detonator, and performing error prompt when the read configuration information does not meet the requirements, and ending the flow;
4) Sending a scanning instruction, acquiring the UID and state information of the detonator, recording the UID in the initiator, and checking whether the state information is correct;
5) Transmitting a command for writing the delay value and the hole position value, addressing by using the UID, and writing the delay value and the hole position value of the detonator;
6) Transmitting a reading delay value and a hole position value instruction, reading the corresponding value written before, and confirming that the writing is successful;
7) Sending a bus power-off instruction;
the S3 digital detonator online networking specifically comprises the following steps:
1) The bus is connected, a mode switching instruction is sent, the mode of the module is set to be a networking mode, and the bus is continuously powered for 16V at the moment;
2) After the bus is powered for a period of time, 3 discharging instructions are sent, and the interval is at least 10ms; 3 times of detonator initialization instructions are sent, and the interval is at least 500ms;
3) Transmitting an instruction for acquiring detonator configuration information, and acquiring UID length, detonation password length and version information used by the detonator;
4) Transmitting an instruction for writing the delay value and the hole position value, and writing the delay value and the hole position value one by one according to the UID registered by the scanning code;
5) Transmitting a UID read state clearing instruction, continuously transmitting a scanning instruction until all on-net detonators are scanned out or 10 continuous times of reply data are all 0, determining that all registered detonators are on the net, and detecting state bit information of each detonator under the condition of no broken line;
the state bit information of the initial detonator is 0x00, if the delay value and the hole position value obtained by detonator scanning are not consistent with the written value in the step 4), the step 4) is re-executed on the inconsistent detonator, and then the step 5) is re-executed on all the detonators;
6) If the detonator is not scanned out or is scanned to an unregistered detonator, sending state information of the reading delay value and the hole position value instruction roll call confirmation detonator, or repeatedly executing the step 5);
7) Transmitting a delay calibration instruction to perform broadcast delay calibration;
the specific detonation step of the exploder in the step S3 comprises the following steps:
a) Sending a detonation password verification instruction, and verifying the detonation passwords of all detonators;
b) Transmitting a state instruction for clearing UID read, continuously transmitting a scanning instruction until all network-on detonators are scanned out or 10 continuous times of reply data are all 0, determining that all current detonators are still on the network without wire breakage, and detecting state bit information, delay and hole site value information of each detonator;
c) If the detonator is not scanned out or the unregistered detonator is scanned out, sending a reading delay value and a hole position value instruction roll call to confirm the state information of the detonator or rescanning;
d) If the step b is correctly performed and the steps are correctly performed, then if a command for reading the delay value and the hole position value is sent, the read detonator state bit information is 0x0D;
e) B, when the state bit scanned in the step B shows that the calibration is unsuccessful, confirming delay time, then sending a delay calibration instruction, and carrying out broadcast delay calibration;
f) B, when the scanned status bit in the step b shows that the verification of the detonation password is unsuccessful, confirming the detonation password, re-executing the step a, and sending the detonation password corresponding to the primer which is not verified;
g) Transmitting a reading delay value and a hole position value instruction according to detonator UIDs with all state bit errors; reading the state bits of the detonators again, if the state bits are still wrong, sending 3 discharge instructions, and sending 3 detonator reset instructions; removing the detonator with problems, and then carrying out networking initiation process again;
h) Sending a charging 22v instruction, and performing high-voltage charging to prepare for detonation;
i) Transmitting a verification and initiation command, verifying all detonator states, entering initiation delay if all detonator states are normal, and initiating when the delay time is reached;
and S4, after detonation is completed, the detonation time, UID codes of the online detonators, longitude and latitude, blasting operator information, detonating article information and post-detonation checking information are recorded to form blasting record information and the blasting record information is uploaded to the cloud server.
2. The method for controlling detonation of a digital detonator for improving safety according to claim 1, wherein the step S1 specifically comprises: the method comprises the steps that an operator ID number and a password are input through a mobile phone APP to log in an exploder, the mobile phone APP collects identity card information of an exploder and performs face recognition, the identity information of the exploder is uploaded to a cloud server, the identity information comprises the identity card information, the face recognition information and the contact mode, and if any one of the identity information is not matched, the exploder cannot detonate.
3. The method for controlling detonation of a digital detonator for improving safety according to claim 1, wherein the step S2 specifically comprises:
calling the GPS positioning of the mobile phone, and if the GPS positioning module of the initiator is not in the detonation-allowed area, failing to detonate;
calling the GPS positioning of the mobile phone, and when the GPS positioning module of the initiator is in a detonation inhibition area, failing to detonate;
the Bluetooth of the mobile phone is not connected with the initiator, so that the initiation cannot be performed.
4. The method for controlling detonation of a digital detonator for improving safety according to claim 1, wherein S2 further comprises: key information of detonation date, detonation position and detonation password is extracted from the authorization code, and is compared, and the detonation is allowed to be initiated by the detonator after the comparison is successful.
5. The method for controlling detonation of a digital detonator for improving safety according to claim 1, wherein the step S2 of synthesizing the working code specifically comprises: the digital detonator UID code is 13 bytes, the digital detonator shell code is 13 bytes, the detonation password is 8 bytes, the detonation password, the digital detonator UID code and the digital detonator shell code are bound, and the SAM card key is used for forming a working code without human intervention and automatic encryption.
6. The method for controlling detonation of a digital detonator for improving safety according to claim 1, wherein the step S3 specifically comprises: the mobile phone and the exploder communicate through Bluetooth, the exploder receives the authorization file, and the exploding password of each detonator is extracted and stored.
7. A digital detonator initiation control system for enhanced security, said system for implementing the method for enhanced security digital detonator initiation control of any one of claims 1 to 6 comprising the steps of:
the APP inputs an operator ID number and a password to log in the initiator, and the identity information of the initiator is uploaded to the cloud server; combining the operation code, the digital detonator UID code, the digital detonator shell code and the detonation code into a working code, checking the working code with an authorization code, and if the checking is wrong, the detonation cannot be performed; after checking, the APP sends an authorization file to the initiator;
the server is used for recording the detonation time, UID codes of the online detonators, longitude and latitude, blasting operator information, detonating article information and post-detonation counting information after the detonation is completed;
and the exploder is used for charging the digital detonator after the digital detonator is online and is subjected to nondestructive testing, the exploder explodes, and the electronic switch is disconnected with the physical bus.
CN202210490824.6A 2022-05-07 2022-05-07 Digital detonator initiation control method and system for improving safety Active CN114646243B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210490824.6A CN114646243B (en) 2022-05-07 2022-05-07 Digital detonator initiation control method and system for improving safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210490824.6A CN114646243B (en) 2022-05-07 2022-05-07 Digital detonator initiation control method and system for improving safety

Publications (2)

Publication Number Publication Date
CN114646243A CN114646243A (en) 2022-06-21
CN114646243B true CN114646243B (en) 2023-06-23

Family

ID=81997660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210490824.6A Active CN114646243B (en) 2022-05-07 2022-05-07 Digital detonator initiation control method and system for improving safety

Country Status (1)

Country Link
CN (1) CN114646243B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115164658B (en) * 2022-07-08 2023-09-19 融硅思创(北京)科技有限公司 Automatic digital electronic detonator online system and communication method
CN115063026A (en) * 2022-07-11 2022-09-16 无锡盛景微电子股份有限公司 Civil explosion service cloud platform system
CN115297084B (en) * 2022-08-04 2023-11-28 上海芯跳科技有限公司 Method and system for improving communication efficiency of electronic detonator
CN115479511B (en) * 2022-08-10 2023-10-27 上海芯跳科技有限公司 Method and system for online detection of electronic detonator networking
CN115247983B (en) * 2022-09-22 2022-12-20 上海芯飏科技有限公司 Method and system for adaptively adjusting communication parameters

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0434883A1 (en) * 1989-12-29 1991-07-03 Union Espanola De Explosivos S.A. Electronic detonators-exploder system for high-reliable stepped detonation
FR3013827A1 (en) * 2013-11-28 2015-05-29 Davey Bickford ELECTRONIC DETONATOR
CN110044224A (en) * 2019-03-28 2019-07-23 陈默 A kind of electric detonator and its initiation system of no ignition capacitor

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AR046387A1 (en) * 2003-07-15 2005-12-07 Detnet South Africa Pty Ltd DETONATOR SYSTEM AND DETONATOR PROGRAMMING.
CN101666598B (en) * 2009-09-24 2012-10-10 北京维深数码科技有限公司 Digital electronic detonator blasting system and control method thereof
CN101666600B (en) * 2009-09-29 2012-10-10 北京维深数码科技有限公司 Novel digital electronic detonator initiator and control method thereof
CN202974054U (en) * 2012-11-21 2013-06-05 浙江宝业建筑智能科技有限公司 Remote detonation control system
CN103115536B (en) * 2013-02-08 2016-08-10 前进民爆股份有限公司 A kind of large-scale method of ignition of the digital electric detonator for engineering explosion
WO2015109417A1 (en) * 2014-01-21 2015-07-30 北京丹芯灵创科技有限公司 Electronic detonator blasting management system and blasting construction method
CN106017239A (en) * 2016-07-22 2016-10-12 中国葛洲坝集团易普力股份有限公司 High-safety electronic detonator initiation system and method thereof
EP3500818B1 (en) * 2016-08-19 2020-08-12 Pavuluri, Bharath Electronic detonator-exploder system
CN107246828A (en) * 2017-08-02 2017-10-13 中国葛洲坝集团易普力股份有限公司 A kind of electric detonator networking structure and control method
CN108253855B (en) * 2018-03-09 2020-07-07 四川美创达安防产品有限公司 Electronic detonator detonation control device with control function and control method
CN109764779B (en) * 2019-02-06 2021-11-23 华夏世昌(北京)科技有限公司 Digital electronic detonator detonation system and method based on double-wire bus
CN109696097B (en) * 2019-02-16 2022-01-07 华夏世昌(北京)科技有限公司 Digital electronic detonator chip based on double-wire bus and control method
CN110823029A (en) * 2019-09-10 2020-02-21 贵州全安密灵科技有限公司 Separated detonation control system and detonation control method
CN111811327A (en) * 2020-07-29 2020-10-23 无锡盛景电子科技有限公司 Universal detonation control platform and detonation control method
CN114111486B (en) * 2021-11-29 2022-10-21 无锡盛景微电子股份有限公司 Electronic detonator initiation device and working method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0434883A1 (en) * 1989-12-29 1991-07-03 Union Espanola De Explosivos S.A. Electronic detonators-exploder system for high-reliable stepped detonation
FR3013827A1 (en) * 2013-11-28 2015-05-29 Davey Bickford ELECTRONIC DETONATOR
CN110044224A (en) * 2019-03-28 2019-07-23 陈默 A kind of electric detonator and its initiation system of no ignition capacitor

Also Published As

Publication number Publication date
CN114646243A (en) 2022-06-21

Similar Documents

Publication Publication Date Title
CN114646243B (en) Digital detonator initiation control method and system for improving safety
CN109764779B (en) Digital electronic detonator detonation system and method based on double-wire bus
CN108253855B (en) Electronic detonator detonation control device with control function and control method
CN101349532B (en) Safe blasting system capable of alarming misfire information
CN201269721Y (en) Apparatus for alarming misfire information of blasting equipment
CN101666598B (en) Digital electronic detonator blasting system and control method thereof
AU2006214797B2 (en) Blasting methods and apparatus with reduced risk of inadvertent or illicit use
CN101666600B (en) Novel digital electronic detonator initiator and control method thereof
CN110823029A (en) Separated detonation control system and detonation control method
CN109696097A (en) Digital electric detonator chip and control method based on dual-wire bus
CN101586933B (en) Electronic detonator monitoring and managing system
CN105066802B (en) Remote-controlled detonation system
US20070159766A1 (en) Electronic blasting system
CN114111486B (en) Electronic detonator initiation device and working method thereof
CN110243240A (en) A kind of electronic detonator initiator by Beidou and UID code constrained and time
CN109556473B (en) Industrial detonator initiator, terminal, system and method
EP1855077A2 (en) Blasting methods and apparatus with reduced risk of inadvertent or illicit use
CN106017239A (en) High-safety electronic detonator initiation system and method thereof
CN109855489A (en) A kind of igniting driving chip and control method
CN108827095B (en) Control system of wireless detonator
US20050131655A1 (en) Logging of detonator usage
CN111811349A (en) Digital electronic detonator management method, storage medium and system
CN111193799B (en) Rocket projectile safe launching control system and control method
CN111998744B (en) Detonation method, device and system for gas electronic excitation tube
CN115077311B (en) Electronic detonator chip for storing detonation information and electronic detonator fault investigation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant