WO2012061850A1 - Wireless blasting module - Google Patents
Wireless blasting module Download PDFInfo
- Publication number
- WO2012061850A1 WO2012061850A1 PCT/ZA2011/000072 ZA2011000072W WO2012061850A1 WO 2012061850 A1 WO2012061850 A1 WO 2012061850A1 ZA 2011000072 W ZA2011000072 W ZA 2011000072W WO 2012061850 A1 WO2012061850 A1 WO 2012061850A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- blasting
- receiver
- module according
- command
- blasting module
- Prior art date
Links
Classifications
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F42—AMMUNITION; BLASTING
- F42C—AMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
- F42C15/00—Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges
- F42C15/40—Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically
- F42C15/42—Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically from a remote location, e.g. for controlled mines or mine fields
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F42—AMMUNITION; BLASTING
- F42D—BLASTING
- F42D1/00—Blasting methods or apparatus, e.g. loading or tamping
- F42D1/04—Arrangements for ignition
- F42D1/045—Arrangements for electric ignition
- F42D1/05—Electric circuits for blasting
- F42D1/055—Electric circuits for blasting specially adapted for firing multiple charges with a time delay
Definitions
- This invention relates to a wireless blasting module for detonating an explosive charge.
- An electronic blasting system offers better timing accuracy than a pyrotechnic or shock tube-based system. This is particularly important so in an application in which improved rock fragmentation and low vibration are dependent upon accurate timing. Nonetheless, an electronic blasting system suffers from a disadvantage in that it is normally based on the use of an insulated electrical conductors or wires to interconnect electronic detonators to one another and to a control device.
- the wires can be broken, for example when priming the blasting holes or during stemming procedures. Damage to the insulation on the wires can result in current leakage which, in turn, can impair communication capability.
- the wires when positioned on an exposed surface, are also prone to damage by personnel and machinery.
- a blasting system based on wireless techniques avoids the need for electrical conductors.
- a wireless system can be expensive and there is an ongoing concern about safety levels inherent in this type of technology.
- US2008/0307993A1 proposes wirelessly coupling blasting energy into detonators at blast time so that wireless blasting modules can function at low voltages and currents before blast time. This technique does require a high power transmitter which is capable of transferring energy at the required level, through the rock which is to be blasted, to the blasting modules.
- US4685396 is based on the use of a low voltage or low current power supply for a wireless module. Voltage step-up, amplification or charging circuitry is used to charge a firing capacitor prior to blasting. This approach does provide protection against directly connecting a wireless detonator battery to an initiating element but remains dependent on the circuitry not charging the firing capacitor inadvertently. This is an adverse safety factor.
- US201017041 1A1 is concerned with a military wireless initiation system for firing electrical detonators immediately upon receipt of a firing command. Use is made of dual processors, in a receiver, which are responsive to signals transmitted wirelessly from a control unit. These guard against inadvertent initiation due to failure of a single processor. However the system does not include a facility for delaying the initiation of detonators relative to the receipt of a fire command and the receiver is not suitable for deployment in a blast hole. The system appears to use radio frequency rather than magnetic communications and its capability of communicating through rock is severely compromised.
- An object of the present invention is to provide a wireless blasting module of enhanced capabilities.
- the invention provides a wireless blasting module which includes a receiver which, in response to at least one magnetic control signal transmitted in a wireless manner from a control device, produces at least one output signal, at least first and second processors which process the at least one output signal, an energy source, terminals to which a detonator component is connectable and a switching arrangement which is operative in response to a predetermined processing relationship between the first and second processors thereby to connect the energy source to the terminals.
- the detonator component may be a detonator, or an igniter for a detonator.
- the use of a magnetic control signal provides an enhanced capability of establishing effective communication through a body of rock.
- the receiver, in the wireless blasting module, may thus be deployed inside a blast hole.
- the blasting module may include a timer which executes a timing interval of predetermined duration.
- the duration of the timing interval may be variable and may be programmed into the module using any suitable technique.
- the duration of the timing interval may be programmed by means of a suitable command from the control device by coupling a control signal to the module at the time of deployment of the blasting module in a blast hole.
- the wireless blasting module may include a delay timer which inhibits the module from going into an operative mode in which blasting is possible for a period which is commenced after deployment of the module in a blast system.
- Forward error correction techniques or any other cryptographic or coding or communication system may be employed to improve reliability of transmission of the control signal and hence to guard against unintended initiation.
- the receiver may be responsive to a plurality of control signals which are repeated at intervals and which contain substantially the same information but which include time-related information which enables successive signals to be differentiated from one another.
- At least one of the processors may include an oscillator.
- the oscillator may be a crystal or ceramic resonator or RC oscillator. The oscillator is calibrated close to actual blasting time to avoid drift, ideally in response to a command signal from the control device.
- Each processor may be controlled by the same oscillator. Alternatively each processor includes a dedicated oscillator.
- the energy source may include a battery.
- An energy storage device such as a capacitor may be chargeable by the battery to accumulate sufficient energy for reliable initiation of a detonator.
- the module may include at least one unique identifier. This may be in any suitable form and in this connection use may be made of a bar-coded system, an rfid or any other suitable mechanism or technique. At least one processor may store a unique identifier. The identifier may be assigned to the module under factory conditions or on site.
- the quantity of power available at the receiver is low and communication from the wireless blasting module, positioned inside a borehole, cannot readily and reliably be effected as a result of signal attenuation by the surrounding rock mass.
- use of the module must be based on the premise that reliable one-way communication from an external controller to the receiver, deployed in a blast hole, can be achieved.
- a magnetic control signal which has the capability of propagating, at least to some extent, through a body of rock; the use of redundancy techniques such as repeated transmission of commands; and the detection and elimination of errors in a signal received by the receiver - an aspect which can be addressed to some extent at least by use of forward error correction codes and similar techniques.
- the capability of transmitting in a reliable manner from an external controller to the receiver, deployed in a blast hole means that a user-settable time delay can be assigned to the blasting module in an effective and reliable manner.
- Figure 1 is a schematic representation of a wireless blasting module according to one form of the invention.
- Figure 2 illustrates a possible physical relationship between the module and a detonator and booster
- FIG. 3 illustrates an established blasting system.
- FIG. 1 of the accompanying drawings illustrates in block diagram form a circuit arrangement of a wireless blasting module 10 according to the invention.
- the module includes an antenna 12, a receiver/amplifier 14, a filter 16, first and second processors 18 and 20 respectively, a capacitor 24, a battery 26 and a switching arrangement 28 connected to output terminals 30.
- a detonator or a detonator igniter of any appropriate construction, not shown, is connected to the terminals.
- Each processor may be of any suitable kind and for example may be a microprocessor, an application-specific integrated circuit (ASIC), FPGA, custom- designed logic or the like.
- the processors may be physically separate from each other. Alternatively the processors are contained in the same package or are on the same silicon die.
- the timing of each processor is controlled by an internal RC oscillator respectively dependent on (i.e. calibrated from) externally connected crystals 34 and 36. Such calibration techniques are known in the art.
- Each RC oscillator is used during a timing interval countdown to make the system insensitive to mechanical shock, for example from adjacent explosions that may influence the crystal oscillators.
- the antenna 12 is a multi-directional device and modulation techniques and frequencies are chosen, as appropriate, for the specific application.
- the receiver 14 operates at a low frequency using through-the-earth magnetic communication techniques and pulse code modulation as are described, for example, in Microchip Application Note AN232.
- the receiver employs automatic gain techniques and strips noise through the use of filtering techniques implemented by means of analogue circuitry, through the use of DSP techniques implemented by means of digital circuitry, or by suitable software or firmware.
- the output of the receiver 14, suitably amplified, is coupled, after passing through the filter 16, to each processor 18 and 20.
- the switching arrangement 28 includes field effect transistors 40 and 42 which are respectively connected to outputs from the processors 18 and 20 and which are used to control discharge of the capacitor through a detonator or igniter connected to the terminals 30.
- the module 10 is contained in a suitable housing 50 which carries a small eyelet or hook 52.
- the detonator component used e.g. a detonator 54 embedded in a booster explosive 56, is attached to the housing 50 in any appropriate way.
- a cord, not shown, attached to the eyelet or hook is used as a suspension arrangement whereby the combination of the module and the booster can be lowered into a blast hole at a blasting site.
- the housing 50 protects the module 10 from the ingress of liquids and against mechanical shock.
- FIG. 3 shows a blast site 60 which includes a plurality of boreholes 62.
- a control device 64 is connected to an output antenna 66 which is looped around the blast site and the boreholes.
- the control device which controls the blasting process, includes a processor 68, a display 70, a keyboard or any other input device 72 connected to the processor, a key input 74 without which the processor is inoperative, a transmitting amplifier 76 which is connected to the loop antenna 66 and a radio frequency transmitter/receiver 78 for communication purposes with other blasting equipment via an antenna 80.
- Each borehole 62 contains explosive material and one or more blasting modules with attendant detonators and boosters, according to requirement.
- Each module is supplied to a user point in a non-powered state. Typically the module is supplied with the battery 26 separate from the other components.
- the battery 26 may be disconnected from the remainder of the circuit electronically or by means of a physical switch. Alternatively the battery may be attached to the remainder of the module by a user. A battery pull tab could be used to connect the battery to a circuit or a switch in the module could be activated, when necessary, by a user.
- a printed barcode, rfid or an internal identifier stored in one or both of the processors is used for tracking purposes.
- the identifier which is assigned to the module may be unique for a particular blast and may be assigned by a programmer. Alternatively the identifier may be unique in an absolute sense and may be an identifier which is supplied under factory conditions.
- the module 10 optionally includes a programming connector 82.
- a programming connector 82 By connecting a suitable programming unit to the connector an electronic latching switch can be activated to power the module. It is also possible to activate the module using a radio or magnetic signal but this is less desirable for the capability of activation over a distance inherently reduces the safety characteristics of the module.
- Firing time information for the module is supplied to the programming connector 80 by means of a programming machine. This can happen at any appropriate time before a fire command is sent to the module.
- the firing time (delay time) could be pre-programmed in a factory environment.
- Commands which are sent via the programming connector 82 make use of appropriate acknowledgement and cyclic redundancy checks to ensure proper receipt of the commands.
- delay time information originated from a programming machine, is supplied to the module in a wireless manner, for example from the control device 64 to the receiver 14 using a magnetic signal - this can be done reliably and effectively using a magnetic signal which can propagate through a rock body even once the module has been deployed in a blast hole.
- As communication between the control unit and the module is in one direction only each signal which is transmitted to the module should make use of forward error correction techniques. Alternatively or additionally each signal should be repeated at least once to enhance reliability.
- each processor controls a separate, series-connected fire switch i.e. the transistors 40 and 42 respectively which are in series with the energy storage capacitor 24.
- commands between the processors 18 and 20 must be validated.
- a communications link 90 between the processors enables each processor to verify the state of the other processor.
- Another technique requires the removal of a controlled electrical short circuit over the output of the capacitor 24.
- each processor may be required for each processor so that each processor produces a predetermined output signal which leads to firing of the detonator.
- the commands are preferably suitably encoded but the use of a preamble, forward error correction and a cyclic redundancy check is desirable to ensure reliable command reception.
- a command transmitted by the control device 64 is repeated at least once but preferably a number of times. When this occurs each successive command is identical to a preceding command but contains time information to enable the command to be distinguished from the preceding command.
- four identical ARM commands may be transmitted at spaced time intervals.
- four FIRE commands may be transmitted in succession at fixed time intervals.
- the FIRE commands may be distinguished from one another by means of information stored in the processors beforehand. For example a first fire command may be "FIRE + 3"; a second fire command may be "FIRE + 2"; a third fire command may be "FIRE + 1 "; and a fourth fire command may be "FIRE".
- Receipt of any of these commands suitably interpreted by one or both processors means that firing must take place after three delay periods, two delay periods, one delay period, and zero delay period, as the case may be.
- the fire commands thus contain data relating to an offset time to be added to a countdown sequence upon reception.
- By modifying the offset time which is sent with each successive fire command receipt of any one fire command results in an accurate execution thereof i.e. in an accurately timed firing event.
- substantially identical arm commands can be distinguished from each other.
- substantially identical START_CALIBRATE and STOP CALIBRATE commands may respectively be distinguished from each other.
- At least one of the processors 18 and 20 includes a software timer which generates a delay period during which detonator firing is prohibited and prevented. This can be done by directly connecting the terminals 30 to each other or by introducing an open circuit into the firing circuit, during the deployment period. A similar safeguard can be achieved by making use of a hardware delay timer.
- the detonator uses a fuse as an initiation element then the resistance of the fuse may be tested and reported to the programming unit which is connected to the programming connector 82, during an installation phase. Other self-tests and diagnostic tests such as the voltage of the battery 26, firmware revisions and checksums of firmware and cyclic redundancy checks, can also be implemented. If the detonator is electronic, commands may be sent to the detonator to establish the status and efficacy of the electronic detonator.
- the module preferably enters a low power state after a user-settable time delay if no wireless commands are received.
- the receiver circuit may optionally be turned off at the same time.
- the receiver 14 is powered for a user-settable period during which the receiver is responsive to a signal from the control device. This technique helps to conserve energy consumption. Receipt of a control signal during a powered interval might act to postpone a following sleep period or, equivalently, extend the powered interval - this is useful for example if a blast is to be commenced or a sequence of commands is to be sent to the modules and, during that interval, the modules must be responsive to all commands.
- the control device may also be operable to transmit a disarm command which operates in a similar manner to place the module in a safe state.
- Commands to the processors may be repeated to enhance reliability and forward error correction techniques may be employed, as appropriate.
- each module/detonator assembly Prior to each module/detonator assembly being placed in a blast hole a user connects each module to the programming unit to enable the module.
- the programming unit supplies the module with a fire command which is unique to the given blast, and a firing time.
- Each blast hole is loaded with explosive, as desired, and one or more modules are placed in each blast hole.
- the wire loop antenna 66 is placed around the blast zone (panel) and is connected to the control unit (blasting machine) which is in a safe location.
- the control device possibly under the control of a wired or wireless blast coordinating machine which is communication with the control unit, supplies an appropriate sequence of commands which, as indicated, may include a sequence of ARM commands followed by a sequence of FIRE commands.
- Each processor upon receipt of a first validated FIRE command, adds the supplied fire offset, in the FIRE command, to a local firing time and commences an adjusted firing countdown sequence. After receipt of one validated FIRE command no further wireless commands are processed.
- the antenna 2 and receiver 4 can be clamped to prevent interference that may occur during the blasting sequence.
- the FIRE command includes a cryptographically secure blast identifier that must match an identifier previously loaded into the module via the programming connector 82 for the FIRE command to be considered as valid. In this way separate blasts may be programmed with different blast identifiers and initiated at different times by the control unit.
- the FIRE command which is required for initiation is supplied to the detonator by the programming unit which is connected to the programming connector. This allows the detonators to be shipped with no valid FIRE command.
- Another possibility is for the FIRE command to be randomly generated on site on a per blast basis using any suitable technique such as a cryptographically secure, pseudo random number generator in the programming unit.
- the loop 66 may be tuned manually or automatically using appropriate techniques in order to achieve an appropriate output level so that effective coupling to the wireless detonator modules results.
- One such technique is to switch appropriately valued capacitors into an effective LC loop resonant circuit.
- the required output voltage or power of the loop 66 may be calculated based on the depth of the wireless blasting modules, the expected attenuation due to the rock medium being blasted, a safety factor and the minimum receiver level required by the wireless blasting modules. This can be used as the basis for a "go/no-go" decision as to whether the modules will all satisfactorily receive the signal to blast. This is an important criterion as the communication to the detonators is unidirectional.
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Selective Calling Equipment (AREA)
Abstract
A wireless blasting module which includes dual processors (18, 20) which process an output signal, produced in response to reception of a magnetic control signal, to control the connection of an energy source (26) to a detonator (DET) component.
Description
WIRELESS BLASTING MODULE BACKGROUND OF THE INVENTION
[0001] This invention relates to a wireless blasting module for detonating an explosive charge.
[0002] An electronic blasting system offers better timing accuracy than a pyrotechnic or shock tube-based system. This is particularly important so in an application in which improved rock fragmentation and low vibration are dependent upon accurate timing. Nonetheless, an electronic blasting system suffers from a disadvantage in that it is normally based on the use of an insulated electrical conductors or wires to interconnect electronic detonators to one another and to a control device. The wires can be broken, for example when priming the blasting holes or during stemming procedures. Damage to the insulation on the wires can result in current leakage which, in turn, can impair communication capability. The wires, when positioned on an exposed surface, are also prone to damage by personnel and machinery.
[0003] A blasting system based on wireless techniques avoids the need for electrical conductors. However a wireless system can be expensive and there is an ongoing concern about safety levels inherent in this type of technology.
[0004] US2008/0307993A1 proposes wirelessly coupling blasting energy into detonators at blast time so that wireless blasting modules can function at low voltages and currents before blast time. This technique does require a high power transmitter which is capable of transferring energy at the required level, through the rock which is to be blasted, to the blasting modules.
[0005] US4685396 is based on the use of a low voltage or low current power supply for a wireless module. Voltage step-up, amplification or charging circuitry is used to charge a firing capacitor prior to blasting. This approach does provide protection against directly connecting a wireless detonator battery to an initiating element but remains dependent on the circuitry not charging the firing capacitor inadvertently. This is an adverse safety factor.
[0006] US201017041 1A1 is concerned with a military wireless initiation system for firing electrical detonators immediately upon receipt of a firing command. Use is made of dual processors, in a receiver, which are responsive to signals transmitted wirelessly from a control unit. These guard against inadvertent initiation due to failure of a single processor. However the system does not include a facility for delaying the initiation of detonators relative to the receipt of a fire command and the receiver is not suitable for deployment in a blast hole. The system appears to use radio frequency rather than magnetic communications and its capability of communicating through rock is severely compromised.
[0007] An object of the present invention is to provide a wireless blasting module of enhanced capabilities.
SUMMARY OF THE INVENTION
[0008] The invention provides a wireless blasting module which includes a receiver which, in response to at least one magnetic control signal transmitted in a wireless manner from a control device, produces at least one output signal, at least first and second processors which process the at least one output signal, an energy source, terminals to which a detonator component is connectable and a switching arrangement which is operative in response to a predetermined processing
relationship between the first and second processors thereby to connect the energy source to the terminals.
[0009] The detonator component may be a detonator, or an igniter for a detonator.
[0010] The use of a magnetic control signal provides an enhanced capability of establishing effective communication through a body of rock. The receiver, in the wireless blasting module, may thus be deployed inside a blast hole.
[0011] The blasting module may include a timer which executes a timing interval of predetermined duration. The duration of the timing interval may be variable and may be programmed into the module using any suitable technique. For example the duration of the timing interval may be programmed by means of a suitable command from the control device by coupling a control signal to the module at the time of deployment of the blasting module in a blast hole.
[0012] The wireless blasting module may include a delay timer which inhibits the module from going into an operative mode in which blasting is possible for a period which is commenced after deployment of the module in a blast system.
[0013] Forward error correction techniques or any other cryptographic or coding or communication system may be employed to improve reliability of transmission of the control signal and hence to guard against unintended initiation.
[0014] The receiver may be responsive to a plurality of control signals which are repeated at intervals and which contain substantially the same information but which include time-related information which enables successive signals to be differentiated from one another.
[0015] At least one of the processors may include an oscillator. The oscillator may be a crystal or ceramic resonator or RC oscillator. The oscillator is calibrated close to actual blasting time to avoid drift, ideally in response to a command signal from the control device. Each processor may be controlled by the same oscillator. Alternatively each processor includes a dedicated oscillator.
[0016] The energy source may include a battery. An energy storage device such as a capacitor may be chargeable by the battery to accumulate sufficient energy for reliable initiation of a detonator.
[0017] The module may include at least one unique identifier. This may be in any suitable form and in this connection use may be made of a bar-coded system, an rfid or any other suitable mechanism or technique. At least one processor may store a unique identifier. The identifier may be assigned to the module under factory conditions or on site.
[0018] Generally the quantity of power available at the receiver is low and communication from the wireless blasting module, positioned inside a borehole, cannot readily and reliably be effected as a result of signal attenuation by the surrounding rock mass. Thus use of the module must be based on the premise that reliable one-way communication from an external controller to the receiver, deployed in a blast hole, can be achieved. For this reason, at least, use is made of a magnetic control signal which has the capability of propagating, at least to some extent, through a body of rock; the use of redundancy techniques such as repeated transmission of commands; and the detection and elimination of errors in a signal received by the receiver - an aspect which can be addressed to some extent at least by use of forward error correction codes and similar techniques.
[0019] The capability of transmitting in a reliable manner from an external controller to the receiver, deployed in a blast hole, means that a user-settable time delay can be assigned to the blasting module in an effective and reliable manner.
BRIEF DESCRIPTION OF THE DRAWINGS
[0020] The invention is further described by way of example with reference to the accompanying drawings in which:
Figure 1 is a schematic representation of a wireless blasting module according to one form of the invention;
Figure 2 illustrates a possible physical relationship between the module and a detonator and booster; and
Figure 3 illustrates an established blasting system.
DESCRIPTION OF PREFERRED EMBODIMENTS
[0021] Figure 1 of the accompanying drawings illustrates in block diagram form a circuit arrangement of a wireless blasting module 10 according to the invention. The module includes an antenna 12, a receiver/amplifier 14, a filter 16, first and second processors 18 and 20 respectively, a capacitor 24, a battery 26 and a switching arrangement 28 connected to output terminals 30. In use, a detonator or a detonator igniter of any appropriate construction, not shown, is connected to the terminals.
[0022] Each processor may be of any suitable kind and for example may be a microprocessor, an application-specific integrated circuit (ASIC), FPGA, custom- designed logic or the like. The processors may be physically separate from each other. Alternatively the processors are contained in the same package or are on the same silicon die.
[0023] In this embodiment the timing of each processor is controlled by an internal RC oscillator respectively dependent on (i.e. calibrated from) externally connected crystals 34 and 36. Such calibration techniques are known in the art. Each RC oscillator is used during a timing interval countdown to make the system insensitive to mechanical shock, for example from adjacent explosions that may influence the crystal oscillators.
[0024] The antenna 12 is a multi-directional device and modulation techniques and frequencies are chosen, as appropriate, for the specific application. The receiver 14 operates at a low frequency using through-the-earth magnetic communication techniques and pulse code modulation as are described, for example, in Microchip Application Note AN232. The receiver employs automatic gain techniques and strips noise through the use of filtering techniques implemented by means of analogue circuitry, through the use of DSP techniques implemented by means of digital circuitry, or by suitable software or firmware.
[0025] The output of the receiver 14, suitably amplified, is coupled, after passing through the filter 16, to each processor 18 and 20.
[0026] The switching arrangement 28 includes field effect transistors 40 and 42 which are respectively connected to outputs from the processors 18 and 20 and which are used to control discharge of the capacitor through a detonator or igniter connected to the terminals 30.
[0027] Referring to Figure 2 the module 10 is contained in a suitable housing 50 which carries a small eyelet or hook 52. The detonator component used, e.g. a detonator 54 embedded in a booster explosive 56, is attached to the housing 50 in any appropriate way. A cord, not shown, attached to the eyelet or hook is used as a
suspension arrangement whereby the combination of the module and the booster can be lowered into a blast hole at a blasting site. The housing 50 protects the module 10 from the ingress of liquids and against mechanical shock.
[0028] Figure 3 shows a blast site 60 which includes a plurality of boreholes 62. A control device 64 is connected to an output antenna 66 which is looped around the blast site and the boreholes. The control device, which controls the blasting process, includes a processor 68, a display 70, a keyboard or any other input device 72 connected to the processor, a key input 74 without which the processor is inoperative, a transmitting amplifier 76 which is connected to the loop antenna 66 and a radio frequency transmitter/receiver 78 for communication purposes with other blasting equipment via an antenna 80.
[0029] Each borehole 62 contains explosive material and one or more blasting modules with attendant detonators and boosters, according to requirement.
[0030] Each module is supplied to a user point in a non-powered state. Typically the module is supplied with the battery 26 separate from the other components.
[0031] The battery 26 may be disconnected from the remainder of the circuit electronically or by means of a physical switch. Alternatively the battery may be attached to the remainder of the module by a user. A battery pull tab could be used to connect the battery to a circuit or a switch in the module could be activated, when necessary, by a user.
[0032] A printed barcode, rfid or an internal identifier stored in one or both of the processors is used for tracking purposes. The identifier which is assigned to the module may be unique for a particular blast and may be assigned by a programmer.
Alternatively the identifier may be unique in an absolute sense and may be an identifier which is supplied under factory conditions.
[0033] As is shown in Figure 1 the module 10 optionally includes a programming connector 82. By connecting a suitable programming unit to the connector an electronic latching switch can be activated to power the module. It is also possible to activate the module using a radio or magnetic signal but this is less desirable for the capability of activation over a distance inherently reduces the safety characteristics of the module.
[0034] Firing time information for the module is supplied to the programming connector 80 by means of a programming machine. This can happen at any appropriate time before a fire command is sent to the module. The firing time (delay time) could be pre-programmed in a factory environment. Commands which are sent via the programming connector 82 make use of appropriate acknowledgement and cyclic redundancy checks to ensure proper receipt of the commands. In another approach delay time information, originated from a programming machine, is supplied to the module in a wireless manner, for example from the control device 64 to the receiver 14 using a magnetic signal - this can be done reliably and effectively using a magnetic signal which can propagate through a rock body even once the module has been deployed in a blast hole. As communication between the control unit and the module is in one direction only each signal which is transmitted to the module should make use of forward error correction techniques. Alternatively or additionally each signal should be repeated at least once to enhance reliability.
[0035] The output of the receiver 14 is directed to each processor. An important aspect of this invention is that the processors must execute a predetermined processing interactive relationship in order for reliable firing of the detonator to take
place. Various techniques can be adopted in this respect and the scope of the invention is by no means limited to the following examples. In one instance, as shown in Figure 1 , each processor controls a separate, series-connected fire switch i.e. the transistors 40 and 42 respectively which are in series with the energy storage capacitor 24. Alternatively or additionally, commands between the processors 18 and 20 must be validated. A communications link 90 between the processors enables each processor to verify the state of the other processor. Another technique requires the removal of a controlled electrical short circuit over the output of the capacitor 24. Separate commands may be required for each processor so that each processor produces a predetermined output signal which leads to firing of the detonator. The commands are preferably suitably encoded but the use of a preamble, forward error correction and a cyclic redundancy check is desirable to ensure reliable command reception.
[0036] In an alternative or additional approach a command transmitted by the control device 64 is repeated at least once but preferably a number of times. When this occurs each successive command is identical to a preceding command but contains time information to enable the command to be distinguished from the preceding command. By way of example only four identical ARM commands may be transmitted at spaced time intervals. Thereafter, subject to validation and conventional control aspects, four FIRE commands may be transmitted in succession at fixed time intervals. The FIRE commands may be distinguished from one another by means of information stored in the processors beforehand. For example a first fire command may be "FIRE + 3"; a second fire command may be "FIRE + 2"; a third fire command may be "FIRE + 1 "; and a fourth fire command may be "FIRE". Receipt of any of these commands, suitably interpreted by one or both processors means that firing must take place after three delay periods, two delay periods, one
delay period, and zero delay period, as the case may be. Thus receipt of only one fire command is sufficient to cause firing to take place at a desired time. The fire commands thus contain data relating to an offset time to be added to a countdown sequence upon reception. By modifying the offset time which is sent with each successive fire command receipt of any one fire command results in an accurate execution thereof i.e. in an accurately timed firing event. Similarly, substantially identical arm commands can be distinguished from each other. For calibration purposes, substantially identical START_CALIBRATE and STOP CALIBRATE commands may respectively be distinguished from each other.
[0037] At least one of the processors 18 and 20 includes a software timer which generates a delay period during which detonator firing is prohibited and prevented. This can be done by directly connecting the terminals 30 to each other or by introducing an open circuit into the firing circuit, during the deployment period. A similar safeguard can be achieved by making use of a hardware delay timer.
[0038] If the detonator uses a fuse as an initiation element then the resistance of the fuse may be tested and reported to the programming unit which is connected to the programming connector 82, during an installation phase. Other self-tests and diagnostic tests such as the voltage of the battery 26, firmware revisions and checksums of firmware and cyclic redundancy checks, can also be implemented. If the detonator is electronic, commands may be sent to the detonator to establish the status and efficacy of the electronic detonator.
[0039] The module preferably enters a low power state after a user-settable time delay if no wireless commands are received. The receiver circuit may optionally be turned off at the same time. At user-settable intervals the receiver 14 is powered for a user-settable period during which the receiver is responsive to a signal from the
control device. This technique helps to conserve energy consumption. Receipt of a control signal during a powered interval might act to postpone a following sleep period or, equivalently, extend the powered interval - this is useful for example if a blast is to be commenced or a sequence of commands is to be sent to the modules and, during that interval, the modules must be responsive to all commands.
[0040] The use of an ARM command has been referred to. This signal is transmitted to the processors by the receiver if a time period is required for the charging of the capacitor 24 or if preparatory commands must be sent to the detonator (for example). Upon receipt of an ARM command one or both processors may execute a timing interval. If a FIRE command is not forthcoming during the timing interval the module may again enter a safe state, for example by sending specific commands to the detonator component, so that the detonator component cannot be fired. The capacitor 24, if charged during this period, can alternatively or additionally be discharged.
[0041] The control device may also be operable to transmit a disarm command which operates in a similar manner to place the module in a safe state.
[0042] Commands to the processors may be repeated to enhance reliability and forward error correction techniques may be employed, as appropriate.
[0043] Prior to each module/detonator assembly being placed in a blast hole a user connects each module to the programming unit to enable the module. The programming unit supplies the module with a fire command which is unique to the given blast, and a firing time. Each blast hole is loaded with explosive, as desired, and one or more modules are placed in each blast hole. Subsequently the wire loop
antenna 66 is placed around the blast zone (panel) and is connected to the control unit (blasting machine) which is in a safe location.
[0044] The control device, possibly under the control of a wired or wireless blast coordinating machine which is communication with the control unit, supplies an appropriate sequence of commands which, as indicated, may include a sequence of ARM commands followed by a sequence of FIRE commands.
[0045] Each processor, upon receipt of a first validated FIRE command, adds the supplied fire offset, in the FIRE command, to a local firing time and commences an adjusted firing countdown sequence. After receipt of one validated FIRE command no further wireless commands are processed. The antenna 2 and receiver 4 can be clamped to prevent interference that may occur during the blasting sequence.
[0046] Preferably the FIRE command includes a cryptographically secure blast identifier that must match an identifier previously loaded into the module via the programming connector 82 for the FIRE command to be considered as valid. In this way separate blasts may be programmed with different blast identifiers and initiated at different times by the control unit.
[0047] In an alternative approach the FIRE command which is required for initiation is supplied to the detonator by the programming unit which is connected to the programming connector. This allows the detonators to be shipped with no valid FIRE command. Another possibility is for the FIRE command to be randomly generated on site on a per blast basis using any suitable technique such as a cryptographically secure, pseudo random number generator in the programming unit.
[0048] The loop 66 may be tuned manually or automatically using appropriate techniques in order to achieve an appropriate output level so that effective coupling
to the wireless detonator modules results. One such technique is to switch appropriately valued capacitors into an effective LC loop resonant circuit.
[0049] The required output voltage or power of the loop 66 may be calculated based on the depth of the wireless blasting modules, the expected attenuation due to the rock medium being blasted, a safety factor and the minimum receiver level required by the wireless blasting modules. This can be used as the basis for a "go/no-go" decision as to whether the modules will all satisfactorily receive the signal to blast. This is an important criterion as the communication to the detonators is unidirectional.
Claims
A wireless blasting module which includes a receiver which, in response to at least one magnetic control signal transmitted in a wireless manner from a control device, produces at least one output signal, at least first and second processors which process the at least one output signal, an energy source, terminals to which a detonator component is connectable and a switching arrangement which is operative in response to a predetermined processing relationship between the first and second processors thereby to connect the energy source to the terminals.
A blasting module according to claim 1 which includes a delay timer which inhibits the module from going into an operative mode in which blasting is possible, for a period which is commenced after deployment of the module in a blast system.
A blasting module according to claim 1 or 2 wherein the receiver is responsive to a plurality of control signals which are repeated at intervals and which contain substantially the same information but which include time-related information which enables successive signals to be differentiated from one another.
A blasting module according to claim 1 wherein at least one of the processors includes an oscillator which is calibrated in response to a command signal from the control device.
A blasting module according to any one of claims 1 to 4 which includes at least one unique identifier.
A blasting module according to any one of claims 1 to 5 wherein the receiver operates using through-the-earth magnetic communication techniques and pulse code modulation. A blasting module according to claim 1 which includes first and second switches, which are connected in series with each other, the energy source and the detonator component, and which are operable respectively by the first and second processors. A blasting module according to claim 1 which includes a programming connector which receives firing time information from a programming machine. A blasting module according to claim 1 wherein the receiver is responsive to a magnetic signal from the control device thereby to receive firing time information from a programming machine. A blasting module according to claim 1 wherein the receiver is responsive to each of a plurality of successive commands, wherein each command is identical to a preceding command but contains time information to enable the command to be distinguished from the preceding command whereby receipt of only one command results in an accurate execution thereof. A blasting module according to claim 1 wherein the receiver is turned off after a user-settable time delay if no wireless commands are received and thereafter, at user-settable intervals the receiver is powered for a user- settable period during which the receiver is responsive to a signal from the control device.
A blasting module according to claim 1 wherein upon receipt of an ARM command by the receiver at least one processor executes a timing interval and if a FIRE command is not received during the timing interval it is not possible to fire the detonator component. A combination comprising a housing, a suspension arrangement on the housing, a detonator module according to claim 1 in the housing, and a booster explosive in which the detonator component is embedded. A blasting system which includes a blast site, a plurality of boreholes at the site, an output antenna looped around the boreholes, a control device connected to the looped antenna, explosive material in each borehole, and at least one respective blasting module according to claim 1 in each borehole, and wherein the control device produces a magnetic control signal to establish unidirectional communication with each receiver, in the respective blasting modules.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2012101113A AU2012101113A4 (en) | 2010-11-04 | 2011-09-23 | Wireless blasting module |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ZA2010/07921 | 2010-11-04 | ||
ZA201007921 | 2010-11-04 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2012101113A Division AU2012101113A4 (en) | 2010-11-04 | 2011-09-23 | Wireless blasting module |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012061850A1 true WO2012061850A1 (en) | 2012-05-10 |
Family
ID=44947269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/ZA2011/000072 WO2012061850A1 (en) | 2010-11-04 | 2011-09-23 | Wireless blasting module |
Country Status (2)
Country | Link |
---|---|
AR (1) | AR083778A1 (en) |
WO (1) | WO2012061850A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104406469A (en) * | 2014-10-15 | 2015-03-11 | 上海无线电设备研究所 | Laser fuze signal processing circuit and laser fuze signal processing method |
WO2015143501A1 (en) * | 2014-03-27 | 2015-10-01 | Orica International Pte Ltd | Apparatus, system and method for blasting using magnetic communication signal |
WO2015143502A1 (en) * | 2014-03-27 | 2015-10-01 | Orica International Pte Ltd | Apparatus, system and method for blasting |
WO2015199620A1 (en) * | 2015-09-16 | 2015-12-30 | Orica International Pte Ltd | A wireless initiation device |
WO2015161326A3 (en) * | 2014-04-16 | 2016-02-25 | Detnet South Africa (Pty) Limited | A method of obtaining seismic information |
EP3367051A3 (en) * | 2013-12-02 | 2018-11-28 | Austin Star Detonator Company | Methods for wireless blasting |
WO2020176939A1 (en) * | 2019-03-04 | 2020-09-10 | Voyager Innovations Pty Ltd | Wireless detonation system |
WO2020263193A1 (en) * | 2019-06-27 | 2020-12-30 | Orica International Pte Ltd | Commercial blasting systems |
CN112346112A (en) * | 2020-09-18 | 2021-02-09 | 中国石油天然气集团有限公司 | Well gun remote explosion system capacity expansion device and method and well gun remote explosion system |
WO2021222947A1 (en) * | 2020-04-29 | 2021-11-04 | Detnet South Africa (Pty) Ltd | Wireless detonator assembly |
CN114279281A (en) * | 2022-01-18 | 2022-04-05 | 北京伊拜科技有限责任公司 | Detonation control method of wireless detonator detonation network |
WO2022246481A1 (en) * | 2021-05-20 | 2022-11-24 | Detnet South Africa (Pty) Ltd | Apparatus for use in a wireless detonator system |
CN115790298A (en) * | 2022-10-31 | 2023-03-14 | 维纳芯科技(无锡)有限公司 | Electronic control module for geological exploration electronic detonator and detonation control method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4685396A (en) | 1984-09-04 | 1987-08-11 | Imperial Chemical Industries Plc | Method and apparatus for safer remotely controlled firing of ignition elements |
US4884506A (en) * | 1986-11-06 | 1989-12-05 | Electronic Warfare Associates, Inc. | Remote detonation of explosive charges |
US6105688A (en) * | 1998-07-22 | 2000-08-22 | Schlumberger Technology Corporation | Safety method and apparatus for a perforating gun |
US20040196605A1 (en) * | 2003-02-04 | 2004-10-07 | Don Dinn | Passive inductive switch |
US20080083344A1 (en) * | 2005-11-14 | 2008-04-10 | Deguire Daniel R | Safe and arm system for a robot |
US20080227390A1 (en) * | 2007-03-16 | 2008-09-18 | Magneto-Inductive Systems Limited | Method and system for relaying signals from a magneto-inductive system through a voice-band system |
US20080307993A1 (en) | 2004-11-02 | 2008-12-18 | Orica Explosives Technology Pty Ltd | Wireless Detonator Assemblies, Corresponding Blasting Apparatuses, and Methods of Blasting |
US20100170411A1 (en) | 2006-09-19 | 2010-07-08 | Mas Zengrange (Nz) Ltd | Remote initiator for the remote initiation of explosive charges |
-
2011
- 2011-09-23 WO PCT/ZA2011/000072 patent/WO2012061850A1/en active Application Filing
- 2011-11-04 AR ARP110104139 patent/AR083778A1/en unknown
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4685396A (en) | 1984-09-04 | 1987-08-11 | Imperial Chemical Industries Plc | Method and apparatus for safer remotely controlled firing of ignition elements |
US4884506A (en) * | 1986-11-06 | 1989-12-05 | Electronic Warfare Associates, Inc. | Remote detonation of explosive charges |
US6105688A (en) * | 1998-07-22 | 2000-08-22 | Schlumberger Technology Corporation | Safety method and apparatus for a perforating gun |
US20040196605A1 (en) * | 2003-02-04 | 2004-10-07 | Don Dinn | Passive inductive switch |
US20080307993A1 (en) | 2004-11-02 | 2008-12-18 | Orica Explosives Technology Pty Ltd | Wireless Detonator Assemblies, Corresponding Blasting Apparatuses, and Methods of Blasting |
US20080083344A1 (en) * | 2005-11-14 | 2008-04-10 | Deguire Daniel R | Safe and arm system for a robot |
US20100170411A1 (en) | 2006-09-19 | 2010-07-08 | Mas Zengrange (Nz) Ltd | Remote initiator for the remote initiation of explosive charges |
US20080227390A1 (en) * | 2007-03-16 | 2008-09-18 | Magneto-Inductive Systems Limited | Method and system for relaying signals from a magneto-inductive system through a voice-band system |
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3367051A3 (en) * | 2013-12-02 | 2018-11-28 | Austin Star Detonator Company | Methods for wireless blasting |
US11009331B2 (en) | 2013-12-02 | 2021-05-18 | Austin Star Detonator Company | Method and apparatus for wireless blasting |
EP3553459A1 (en) * | 2013-12-02 | 2019-10-16 | Austin Star Detonator Company | Methods for wireless blasting |
US10429162B2 (en) | 2013-12-02 | 2019-10-01 | Austin Star Detonator Company | Method and apparatus for wireless blasting with first and second firing messages |
JP2017512968A (en) * | 2014-03-27 | 2017-05-25 | オリカ インターナショナル プライベート リミティド | Apparatus, system and method |
WO2015143502A1 (en) * | 2014-03-27 | 2015-10-01 | Orica International Pte Ltd | Apparatus, system and method for blasting |
JP2017510785A (en) * | 2014-03-27 | 2017-04-13 | オリカ インターナショナル プライベート リミティド | Apparatus, system and method |
WO2015143501A1 (en) * | 2014-03-27 | 2015-10-01 | Orica International Pte Ltd | Apparatus, system and method for blasting using magnetic communication signal |
EP3123104A4 (en) * | 2014-03-27 | 2017-11-01 | Orica International Pte Ltd | Apparatus, system and method for blasting |
EP3123103A4 (en) * | 2014-03-27 | 2017-11-01 | Orica International Pte Ltd | Apparatus, system and method for blasting using magnetic communication signal |
US10113843B2 (en) | 2014-03-27 | 2018-10-30 | Orica International Pte Ltd | Apparatus, system and method for initiation of buried explosives |
AU2015234708B2 (en) * | 2014-03-27 | 2020-01-02 | Orica International Pte Ltd | Apparatus, system and method for blasting using magnetic communication signal |
US10295323B2 (en) | 2014-03-27 | 2019-05-21 | Orica International Pte Ltd. | Apparatus, system and method for blasting using magnetic communication signal |
RU2697980C2 (en) * | 2014-03-27 | 2019-08-21 | Орика Интернэшнл Пте Лтд | Apparatus, system and method |
AU2015234603B2 (en) * | 2014-03-27 | 2020-01-02 | Orica International Pte Ltd | Apparatus, system and method for blasting |
US20170074630A1 (en) * | 2014-03-27 | 2017-03-16 | Orica International Pte Ltd | Apparatus, System And Method For Blasting Using Magnetic Communication Signal |
RU2710580C2 (en) * | 2014-03-27 | 2019-12-27 | Орика Интернэшнл Пте Лтд | Apparatus, system and method |
WO2015161326A3 (en) * | 2014-04-16 | 2016-02-25 | Detnet South Africa (Pty) Limited | A method of obtaining seismic information |
CN104406469A (en) * | 2014-10-15 | 2015-03-11 | 上海无线电设备研究所 | Laser fuze signal processing circuit and laser fuze signal processing method |
WO2015199620A1 (en) * | 2015-09-16 | 2015-12-30 | Orica International Pte Ltd | A wireless initiation device |
EA037944B1 (en) * | 2015-09-16 | 2021-06-10 | Орика Интернэшнл Пте Лтд | Wireless initiation device |
AU2015280721B2 (en) * | 2015-09-16 | 2021-07-22 | Orica International Pte Ltd | A wireless initiation device |
AU2015280721C1 (en) * | 2015-09-16 | 2022-10-27 | Orica International Pte Ltd | A wireless initiation device |
US11248895B2 (en) | 2015-09-16 | 2022-02-15 | Orica International Pte Ltd | Wireless initiation device |
WO2020176939A1 (en) * | 2019-03-04 | 2020-09-10 | Voyager Innovations Pty Ltd | Wireless detonation system |
US11867493B2 (en) | 2019-03-04 | 2024-01-09 | Voyager Innovations Pty Ltd | Wireless detonation system |
AU2020230556B2 (en) * | 2019-03-04 | 2022-02-17 | Voyager Innovations Pty Ltd | Wireless detonation system |
CN113544461A (en) * | 2019-03-04 | 2021-10-22 | 航行者创新私人有限公司 | Wireless detonation system |
WO2020263193A1 (en) * | 2019-06-27 | 2020-12-30 | Orica International Pte Ltd | Commercial blasting systems |
CN114342285A (en) * | 2019-06-27 | 2022-04-12 | 澳瑞凯国际有限公司 | Commercial blasting system |
US12078467B2 (en) | 2019-06-27 | 2024-09-03 | Orica International Pte Ltd | Commercial blasting systems |
WO2021222947A1 (en) * | 2020-04-29 | 2021-11-04 | Detnet South Africa (Pty) Ltd | Wireless detonator assembly |
US11874098B2 (en) | 2020-04-29 | 2024-01-16 | Detnet South Africa (Pty) Ltd | Wireless detonator assembly |
CN112346112A (en) * | 2020-09-18 | 2021-02-09 | 中国石油天然气集团有限公司 | Well gun remote explosion system capacity expansion device and method and well gun remote explosion system |
CN112346112B (en) * | 2020-09-18 | 2024-05-28 | 中国石油天然气集团有限公司 | Capacity expanding device and method of well cannon remote explosion system and well cannon remote explosion system |
WO2022246481A1 (en) * | 2021-05-20 | 2022-11-24 | Detnet South Africa (Pty) Ltd | Apparatus for use in a wireless detonator system |
CN114279281A (en) * | 2022-01-18 | 2022-04-05 | 北京伊拜科技有限责任公司 | Detonation control method of wireless detonator detonation network |
CN114279281B (en) * | 2022-01-18 | 2023-03-21 | 北京伊拜科技有限责任公司 | Detonation control method of wireless detonator detonation network |
CN115790298A (en) * | 2022-10-31 | 2023-03-14 | 维纳芯科技(无锡)有限公司 | Electronic control module for geological exploration electronic detonator and detonation control method |
CN115790298B (en) * | 2022-10-31 | 2023-11-14 | 维纳芯科技(无锡)有限公司 | Electronic control module for geological exploration electronic detonator and detonation control method |
Also Published As
Publication number | Publication date |
---|---|
AR083778A1 (en) | 2013-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012061850A1 (en) | Wireless blasting module | |
AU2021254605B2 (en) | A wireless initiation device | |
KR100616806B1 (en) | System for the initiation of rounds of individually delayed detonators | |
US7975612B2 (en) | Constant-current, rail-voltage regulated charging electronic detonator | |
CA2645206C (en) | Wireless electronic booster, and methods of blasting | |
ES2335101T3 (en) | PROCEDURE FOR IDENTIFYING AN UNKNOWN OR UNMARKED SLAVE DEVICE AS IN AN ELECTRONIC FLYING SYSTEM. | |
KR20010031865A (en) | Controlled electromagnetic induction detonation system for initiation of a detonatable material | |
US5159149A (en) | Electronic device | |
US20230296364A1 (en) | Improved communications in electronic detonators | |
US11105600B1 (en) | Identification method in a detonator network | |
AU2012393032B2 (en) | Remote initiator receiver | |
CN105066802A (en) | Remote control initiation system | |
AU2016354618B2 (en) | Wireless detonator | |
JP2019066091A (en) | Detonator | |
US20050011390A1 (en) | ESD-resistant electronic detonator | |
AU2012101113A4 (en) | Wireless blasting module | |
EP1644689B1 (en) | Detonator arming | |
WO2006055991A1 (en) | Detonator | |
WO2021229597A1 (en) | An electronic system for controlled sequential detonation and method thereof | |
EP4143500A1 (en) | Wireless detonator assembly | |
AU2002100859A4 (en) | Electronic detonator buffered connection device | |
MXPA00004358A (en) | Controlled electromagnetic induction detonation system for initiation of a detonatable material |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11782356 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11782356 Country of ref document: EP Kind code of ref document: A1 |