Nothing Special   »   [go: up one dir, main page]

WO2012061850A1 - Wireless blasting module - Google Patents

Wireless blasting module Download PDF

Info

Publication number
WO2012061850A1
WO2012061850A1 PCT/ZA2011/000072 ZA2011000072W WO2012061850A1 WO 2012061850 A1 WO2012061850 A1 WO 2012061850A1 ZA 2011000072 W ZA2011000072 W ZA 2011000072W WO 2012061850 A1 WO2012061850 A1 WO 2012061850A1
Authority
WO
WIPO (PCT)
Prior art keywords
blasting
receiver
module according
command
blasting module
Prior art date
Application number
PCT/ZA2011/000072
Other languages
French (fr)
Inventor
Craig Charles Schlenter
Original Assignee
Detnet South Africa (Pty) Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Detnet South Africa (Pty) Ltd filed Critical Detnet South Africa (Pty) Ltd
Priority to AU2012101113A priority Critical patent/AU2012101113A4/en
Publication of WO2012061850A1 publication Critical patent/WO2012061850A1/en

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C15/00Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges
    • F42C15/40Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically
    • F42C15/42Arming-means in fuzes; Safety means for preventing premature detonation of fuzes or charges wherein the safety or arming action is effected electrically from a remote location, e.g. for controlled mines or mine fields
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42DBLASTING
    • F42D1/00Blasting methods or apparatus, e.g. loading or tamping
    • F42D1/04Arrangements for ignition
    • F42D1/045Arrangements for electric ignition
    • F42D1/05Electric circuits for blasting
    • F42D1/055Electric circuits for blasting specially adapted for firing multiple charges with a time delay

Definitions

  • This invention relates to a wireless blasting module for detonating an explosive charge.
  • An electronic blasting system offers better timing accuracy than a pyrotechnic or shock tube-based system. This is particularly important so in an application in which improved rock fragmentation and low vibration are dependent upon accurate timing. Nonetheless, an electronic blasting system suffers from a disadvantage in that it is normally based on the use of an insulated electrical conductors or wires to interconnect electronic detonators to one another and to a control device.
  • the wires can be broken, for example when priming the blasting holes or during stemming procedures. Damage to the insulation on the wires can result in current leakage which, in turn, can impair communication capability.
  • the wires when positioned on an exposed surface, are also prone to damage by personnel and machinery.
  • a blasting system based on wireless techniques avoids the need for electrical conductors.
  • a wireless system can be expensive and there is an ongoing concern about safety levels inherent in this type of technology.
  • US2008/0307993A1 proposes wirelessly coupling blasting energy into detonators at blast time so that wireless blasting modules can function at low voltages and currents before blast time. This technique does require a high power transmitter which is capable of transferring energy at the required level, through the rock which is to be blasted, to the blasting modules.
  • US4685396 is based on the use of a low voltage or low current power supply for a wireless module. Voltage step-up, amplification or charging circuitry is used to charge a firing capacitor prior to blasting. This approach does provide protection against directly connecting a wireless detonator battery to an initiating element but remains dependent on the circuitry not charging the firing capacitor inadvertently. This is an adverse safety factor.
  • US201017041 1A1 is concerned with a military wireless initiation system for firing electrical detonators immediately upon receipt of a firing command. Use is made of dual processors, in a receiver, which are responsive to signals transmitted wirelessly from a control unit. These guard against inadvertent initiation due to failure of a single processor. However the system does not include a facility for delaying the initiation of detonators relative to the receipt of a fire command and the receiver is not suitable for deployment in a blast hole. The system appears to use radio frequency rather than magnetic communications and its capability of communicating through rock is severely compromised.
  • An object of the present invention is to provide a wireless blasting module of enhanced capabilities.
  • the invention provides a wireless blasting module which includes a receiver which, in response to at least one magnetic control signal transmitted in a wireless manner from a control device, produces at least one output signal, at least first and second processors which process the at least one output signal, an energy source, terminals to which a detonator component is connectable and a switching arrangement which is operative in response to a predetermined processing relationship between the first and second processors thereby to connect the energy source to the terminals.
  • the detonator component may be a detonator, or an igniter for a detonator.
  • the use of a magnetic control signal provides an enhanced capability of establishing effective communication through a body of rock.
  • the receiver, in the wireless blasting module, may thus be deployed inside a blast hole.
  • the blasting module may include a timer which executes a timing interval of predetermined duration.
  • the duration of the timing interval may be variable and may be programmed into the module using any suitable technique.
  • the duration of the timing interval may be programmed by means of a suitable command from the control device by coupling a control signal to the module at the time of deployment of the blasting module in a blast hole.
  • the wireless blasting module may include a delay timer which inhibits the module from going into an operative mode in which blasting is possible for a period which is commenced after deployment of the module in a blast system.
  • Forward error correction techniques or any other cryptographic or coding or communication system may be employed to improve reliability of transmission of the control signal and hence to guard against unintended initiation.
  • the receiver may be responsive to a plurality of control signals which are repeated at intervals and which contain substantially the same information but which include time-related information which enables successive signals to be differentiated from one another.
  • At least one of the processors may include an oscillator.
  • the oscillator may be a crystal or ceramic resonator or RC oscillator. The oscillator is calibrated close to actual blasting time to avoid drift, ideally in response to a command signal from the control device.
  • Each processor may be controlled by the same oscillator. Alternatively each processor includes a dedicated oscillator.
  • the energy source may include a battery.
  • An energy storage device such as a capacitor may be chargeable by the battery to accumulate sufficient energy for reliable initiation of a detonator.
  • the module may include at least one unique identifier. This may be in any suitable form and in this connection use may be made of a bar-coded system, an rfid or any other suitable mechanism or technique. At least one processor may store a unique identifier. The identifier may be assigned to the module under factory conditions or on site.
  • the quantity of power available at the receiver is low and communication from the wireless blasting module, positioned inside a borehole, cannot readily and reliably be effected as a result of signal attenuation by the surrounding rock mass.
  • use of the module must be based on the premise that reliable one-way communication from an external controller to the receiver, deployed in a blast hole, can be achieved.
  • a magnetic control signal which has the capability of propagating, at least to some extent, through a body of rock; the use of redundancy techniques such as repeated transmission of commands; and the detection and elimination of errors in a signal received by the receiver - an aspect which can be addressed to some extent at least by use of forward error correction codes and similar techniques.
  • the capability of transmitting in a reliable manner from an external controller to the receiver, deployed in a blast hole means that a user-settable time delay can be assigned to the blasting module in an effective and reliable manner.
  • Figure 1 is a schematic representation of a wireless blasting module according to one form of the invention.
  • Figure 2 illustrates a possible physical relationship between the module and a detonator and booster
  • FIG. 3 illustrates an established blasting system.
  • FIG. 1 of the accompanying drawings illustrates in block diagram form a circuit arrangement of a wireless blasting module 10 according to the invention.
  • the module includes an antenna 12, a receiver/amplifier 14, a filter 16, first and second processors 18 and 20 respectively, a capacitor 24, a battery 26 and a switching arrangement 28 connected to output terminals 30.
  • a detonator or a detonator igniter of any appropriate construction, not shown, is connected to the terminals.
  • Each processor may be of any suitable kind and for example may be a microprocessor, an application-specific integrated circuit (ASIC), FPGA, custom- designed logic or the like.
  • the processors may be physically separate from each other. Alternatively the processors are contained in the same package or are on the same silicon die.
  • the timing of each processor is controlled by an internal RC oscillator respectively dependent on (i.e. calibrated from) externally connected crystals 34 and 36. Such calibration techniques are known in the art.
  • Each RC oscillator is used during a timing interval countdown to make the system insensitive to mechanical shock, for example from adjacent explosions that may influence the crystal oscillators.
  • the antenna 12 is a multi-directional device and modulation techniques and frequencies are chosen, as appropriate, for the specific application.
  • the receiver 14 operates at a low frequency using through-the-earth magnetic communication techniques and pulse code modulation as are described, for example, in Microchip Application Note AN232.
  • the receiver employs automatic gain techniques and strips noise through the use of filtering techniques implemented by means of analogue circuitry, through the use of DSP techniques implemented by means of digital circuitry, or by suitable software or firmware.
  • the output of the receiver 14, suitably amplified, is coupled, after passing through the filter 16, to each processor 18 and 20.
  • the switching arrangement 28 includes field effect transistors 40 and 42 which are respectively connected to outputs from the processors 18 and 20 and which are used to control discharge of the capacitor through a detonator or igniter connected to the terminals 30.
  • the module 10 is contained in a suitable housing 50 which carries a small eyelet or hook 52.
  • the detonator component used e.g. a detonator 54 embedded in a booster explosive 56, is attached to the housing 50 in any appropriate way.
  • a cord, not shown, attached to the eyelet or hook is used as a suspension arrangement whereby the combination of the module and the booster can be lowered into a blast hole at a blasting site.
  • the housing 50 protects the module 10 from the ingress of liquids and against mechanical shock.
  • FIG. 3 shows a blast site 60 which includes a plurality of boreholes 62.
  • a control device 64 is connected to an output antenna 66 which is looped around the blast site and the boreholes.
  • the control device which controls the blasting process, includes a processor 68, a display 70, a keyboard or any other input device 72 connected to the processor, a key input 74 without which the processor is inoperative, a transmitting amplifier 76 which is connected to the loop antenna 66 and a radio frequency transmitter/receiver 78 for communication purposes with other blasting equipment via an antenna 80.
  • Each borehole 62 contains explosive material and one or more blasting modules with attendant detonators and boosters, according to requirement.
  • Each module is supplied to a user point in a non-powered state. Typically the module is supplied with the battery 26 separate from the other components.
  • the battery 26 may be disconnected from the remainder of the circuit electronically or by means of a physical switch. Alternatively the battery may be attached to the remainder of the module by a user. A battery pull tab could be used to connect the battery to a circuit or a switch in the module could be activated, when necessary, by a user.
  • a printed barcode, rfid or an internal identifier stored in one or both of the processors is used for tracking purposes.
  • the identifier which is assigned to the module may be unique for a particular blast and may be assigned by a programmer. Alternatively the identifier may be unique in an absolute sense and may be an identifier which is supplied under factory conditions.
  • the module 10 optionally includes a programming connector 82.
  • a programming connector 82 By connecting a suitable programming unit to the connector an electronic latching switch can be activated to power the module. It is also possible to activate the module using a radio or magnetic signal but this is less desirable for the capability of activation over a distance inherently reduces the safety characteristics of the module.
  • Firing time information for the module is supplied to the programming connector 80 by means of a programming machine. This can happen at any appropriate time before a fire command is sent to the module.
  • the firing time (delay time) could be pre-programmed in a factory environment.
  • Commands which are sent via the programming connector 82 make use of appropriate acknowledgement and cyclic redundancy checks to ensure proper receipt of the commands.
  • delay time information originated from a programming machine, is supplied to the module in a wireless manner, for example from the control device 64 to the receiver 14 using a magnetic signal - this can be done reliably and effectively using a magnetic signal which can propagate through a rock body even once the module has been deployed in a blast hole.
  • As communication between the control unit and the module is in one direction only each signal which is transmitted to the module should make use of forward error correction techniques. Alternatively or additionally each signal should be repeated at least once to enhance reliability.
  • each processor controls a separate, series-connected fire switch i.e. the transistors 40 and 42 respectively which are in series with the energy storage capacitor 24.
  • commands between the processors 18 and 20 must be validated.
  • a communications link 90 between the processors enables each processor to verify the state of the other processor.
  • Another technique requires the removal of a controlled electrical short circuit over the output of the capacitor 24.
  • each processor may be required for each processor so that each processor produces a predetermined output signal which leads to firing of the detonator.
  • the commands are preferably suitably encoded but the use of a preamble, forward error correction and a cyclic redundancy check is desirable to ensure reliable command reception.
  • a command transmitted by the control device 64 is repeated at least once but preferably a number of times. When this occurs each successive command is identical to a preceding command but contains time information to enable the command to be distinguished from the preceding command.
  • four identical ARM commands may be transmitted at spaced time intervals.
  • four FIRE commands may be transmitted in succession at fixed time intervals.
  • the FIRE commands may be distinguished from one another by means of information stored in the processors beforehand. For example a first fire command may be "FIRE + 3"; a second fire command may be "FIRE + 2"; a third fire command may be "FIRE + 1 "; and a fourth fire command may be "FIRE".
  • Receipt of any of these commands suitably interpreted by one or both processors means that firing must take place after three delay periods, two delay periods, one delay period, and zero delay period, as the case may be.
  • the fire commands thus contain data relating to an offset time to be added to a countdown sequence upon reception.
  • By modifying the offset time which is sent with each successive fire command receipt of any one fire command results in an accurate execution thereof i.e. in an accurately timed firing event.
  • substantially identical arm commands can be distinguished from each other.
  • substantially identical START_CALIBRATE and STOP CALIBRATE commands may respectively be distinguished from each other.
  • At least one of the processors 18 and 20 includes a software timer which generates a delay period during which detonator firing is prohibited and prevented. This can be done by directly connecting the terminals 30 to each other or by introducing an open circuit into the firing circuit, during the deployment period. A similar safeguard can be achieved by making use of a hardware delay timer.
  • the detonator uses a fuse as an initiation element then the resistance of the fuse may be tested and reported to the programming unit which is connected to the programming connector 82, during an installation phase. Other self-tests and diagnostic tests such as the voltage of the battery 26, firmware revisions and checksums of firmware and cyclic redundancy checks, can also be implemented. If the detonator is electronic, commands may be sent to the detonator to establish the status and efficacy of the electronic detonator.
  • the module preferably enters a low power state after a user-settable time delay if no wireless commands are received.
  • the receiver circuit may optionally be turned off at the same time.
  • the receiver 14 is powered for a user-settable period during which the receiver is responsive to a signal from the control device. This technique helps to conserve energy consumption. Receipt of a control signal during a powered interval might act to postpone a following sleep period or, equivalently, extend the powered interval - this is useful for example if a blast is to be commenced or a sequence of commands is to be sent to the modules and, during that interval, the modules must be responsive to all commands.
  • the control device may also be operable to transmit a disarm command which operates in a similar manner to place the module in a safe state.
  • Commands to the processors may be repeated to enhance reliability and forward error correction techniques may be employed, as appropriate.
  • each module/detonator assembly Prior to each module/detonator assembly being placed in a blast hole a user connects each module to the programming unit to enable the module.
  • the programming unit supplies the module with a fire command which is unique to the given blast, and a firing time.
  • Each blast hole is loaded with explosive, as desired, and one or more modules are placed in each blast hole.
  • the wire loop antenna 66 is placed around the blast zone (panel) and is connected to the control unit (blasting machine) which is in a safe location.
  • the control device possibly under the control of a wired or wireless blast coordinating machine which is communication with the control unit, supplies an appropriate sequence of commands which, as indicated, may include a sequence of ARM commands followed by a sequence of FIRE commands.
  • Each processor upon receipt of a first validated FIRE command, adds the supplied fire offset, in the FIRE command, to a local firing time and commences an adjusted firing countdown sequence. After receipt of one validated FIRE command no further wireless commands are processed.
  • the antenna 2 and receiver 4 can be clamped to prevent interference that may occur during the blasting sequence.
  • the FIRE command includes a cryptographically secure blast identifier that must match an identifier previously loaded into the module via the programming connector 82 for the FIRE command to be considered as valid. In this way separate blasts may be programmed with different blast identifiers and initiated at different times by the control unit.
  • the FIRE command which is required for initiation is supplied to the detonator by the programming unit which is connected to the programming connector. This allows the detonators to be shipped with no valid FIRE command.
  • Another possibility is for the FIRE command to be randomly generated on site on a per blast basis using any suitable technique such as a cryptographically secure, pseudo random number generator in the programming unit.
  • the loop 66 may be tuned manually or automatically using appropriate techniques in order to achieve an appropriate output level so that effective coupling to the wireless detonator modules results.
  • One such technique is to switch appropriately valued capacitors into an effective LC loop resonant circuit.
  • the required output voltage or power of the loop 66 may be calculated based on the depth of the wireless blasting modules, the expected attenuation due to the rock medium being blasted, a safety factor and the minimum receiver level required by the wireless blasting modules. This can be used as the basis for a "go/no-go" decision as to whether the modules will all satisfactorily receive the signal to blast. This is an important criterion as the communication to the detonators is unidirectional.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Selective Calling Equipment (AREA)

Abstract

A wireless blasting module which includes dual processors (18, 20) which process an output signal, produced in response to reception of a magnetic control signal, to control the connection of an energy source (26) to a detonator (DET) component.

Description

WIRELESS BLASTING MODULE BACKGROUND OF THE INVENTION
[0001] This invention relates to a wireless blasting module for detonating an explosive charge.
[0002] An electronic blasting system offers better timing accuracy than a pyrotechnic or shock tube-based system. This is particularly important so in an application in which improved rock fragmentation and low vibration are dependent upon accurate timing. Nonetheless, an electronic blasting system suffers from a disadvantage in that it is normally based on the use of an insulated electrical conductors or wires to interconnect electronic detonators to one another and to a control device. The wires can be broken, for example when priming the blasting holes or during stemming procedures. Damage to the insulation on the wires can result in current leakage which, in turn, can impair communication capability. The wires, when positioned on an exposed surface, are also prone to damage by personnel and machinery.
[0003] A blasting system based on wireless techniques avoids the need for electrical conductors. However a wireless system can be expensive and there is an ongoing concern about safety levels inherent in this type of technology.
[0004] US2008/0307993A1 proposes wirelessly coupling blasting energy into detonators at blast time so that wireless blasting modules can function at low voltages and currents before blast time. This technique does require a high power transmitter which is capable of transferring energy at the required level, through the rock which is to be blasted, to the blasting modules. [0005] US4685396 is based on the use of a low voltage or low current power supply for a wireless module. Voltage step-up, amplification or charging circuitry is used to charge a firing capacitor prior to blasting. This approach does provide protection against directly connecting a wireless detonator battery to an initiating element but remains dependent on the circuitry not charging the firing capacitor inadvertently. This is an adverse safety factor.
[0006] US201017041 1A1 is concerned with a military wireless initiation system for firing electrical detonators immediately upon receipt of a firing command. Use is made of dual processors, in a receiver, which are responsive to signals transmitted wirelessly from a control unit. These guard against inadvertent initiation due to failure of a single processor. However the system does not include a facility for delaying the initiation of detonators relative to the receipt of a fire command and the receiver is not suitable for deployment in a blast hole. The system appears to use radio frequency rather than magnetic communications and its capability of communicating through rock is severely compromised.
[0007] An object of the present invention is to provide a wireless blasting module of enhanced capabilities.
SUMMARY OF THE INVENTION
[0008] The invention provides a wireless blasting module which includes a receiver which, in response to at least one magnetic control signal transmitted in a wireless manner from a control device, produces at least one output signal, at least first and second processors which process the at least one output signal, an energy source, terminals to which a detonator component is connectable and a switching arrangement which is operative in response to a predetermined processing relationship between the first and second processors thereby to connect the energy source to the terminals.
[0009] The detonator component may be a detonator, or an igniter for a detonator.
[0010] The use of a magnetic control signal provides an enhanced capability of establishing effective communication through a body of rock. The receiver, in the wireless blasting module, may thus be deployed inside a blast hole.
[0011] The blasting module may include a timer which executes a timing interval of predetermined duration. The duration of the timing interval may be variable and may be programmed into the module using any suitable technique. For example the duration of the timing interval may be programmed by means of a suitable command from the control device by coupling a control signal to the module at the time of deployment of the blasting module in a blast hole.
[0012] The wireless blasting module may include a delay timer which inhibits the module from going into an operative mode in which blasting is possible for a period which is commenced after deployment of the module in a blast system.
[0013] Forward error correction techniques or any other cryptographic or coding or communication system may be employed to improve reliability of transmission of the control signal and hence to guard against unintended initiation.
[0014] The receiver may be responsive to a plurality of control signals which are repeated at intervals and which contain substantially the same information but which include time-related information which enables successive signals to be differentiated from one another. [0015] At least one of the processors may include an oscillator. The oscillator may be a crystal or ceramic resonator or RC oscillator. The oscillator is calibrated close to actual blasting time to avoid drift, ideally in response to a command signal from the control device. Each processor may be controlled by the same oscillator. Alternatively each processor includes a dedicated oscillator.
[0016] The energy source may include a battery. An energy storage device such as a capacitor may be chargeable by the battery to accumulate sufficient energy for reliable initiation of a detonator.
[0017] The module may include at least one unique identifier. This may be in any suitable form and in this connection use may be made of a bar-coded system, an rfid or any other suitable mechanism or technique. At least one processor may store a unique identifier. The identifier may be assigned to the module under factory conditions or on site.
[0018] Generally the quantity of power available at the receiver is low and communication from the wireless blasting module, positioned inside a borehole, cannot readily and reliably be effected as a result of signal attenuation by the surrounding rock mass. Thus use of the module must be based on the premise that reliable one-way communication from an external controller to the receiver, deployed in a blast hole, can be achieved. For this reason, at least, use is made of a magnetic control signal which has the capability of propagating, at least to some extent, through a body of rock; the use of redundancy techniques such as repeated transmission of commands; and the detection and elimination of errors in a signal received by the receiver - an aspect which can be addressed to some extent at least by use of forward error correction codes and similar techniques. [0019] The capability of transmitting in a reliable manner from an external controller to the receiver, deployed in a blast hole, means that a user-settable time delay can be assigned to the blasting module in an effective and reliable manner.
BRIEF DESCRIPTION OF THE DRAWINGS
[0020] The invention is further described by way of example with reference to the accompanying drawings in which:
Figure 1 is a schematic representation of a wireless blasting module according to one form of the invention;
Figure 2 illustrates a possible physical relationship between the module and a detonator and booster; and
Figure 3 illustrates an established blasting system.
DESCRIPTION OF PREFERRED EMBODIMENTS
[0021] Figure 1 of the accompanying drawings illustrates in block diagram form a circuit arrangement of a wireless blasting module 10 according to the invention. The module includes an antenna 12, a receiver/amplifier 14, a filter 16, first and second processors 18 and 20 respectively, a capacitor 24, a battery 26 and a switching arrangement 28 connected to output terminals 30. In use, a detonator or a detonator igniter of any appropriate construction, not shown, is connected to the terminals.
[0022] Each processor may be of any suitable kind and for example may be a microprocessor, an application-specific integrated circuit (ASIC), FPGA, custom- designed logic or the like. The processors may be physically separate from each other. Alternatively the processors are contained in the same package or are on the same silicon die. [0023] In this embodiment the timing of each processor is controlled by an internal RC oscillator respectively dependent on (i.e. calibrated from) externally connected crystals 34 and 36. Such calibration techniques are known in the art. Each RC oscillator is used during a timing interval countdown to make the system insensitive to mechanical shock, for example from adjacent explosions that may influence the crystal oscillators.
[0024] The antenna 12 is a multi-directional device and modulation techniques and frequencies are chosen, as appropriate, for the specific application. The receiver 14 operates at a low frequency using through-the-earth magnetic communication techniques and pulse code modulation as are described, for example, in Microchip Application Note AN232. The receiver employs automatic gain techniques and strips noise through the use of filtering techniques implemented by means of analogue circuitry, through the use of DSP techniques implemented by means of digital circuitry, or by suitable software or firmware.
[0025] The output of the receiver 14, suitably amplified, is coupled, after passing through the filter 16, to each processor 18 and 20.
[0026] The switching arrangement 28 includes field effect transistors 40 and 42 which are respectively connected to outputs from the processors 18 and 20 and which are used to control discharge of the capacitor through a detonator or igniter connected to the terminals 30.
[0027] Referring to Figure 2 the module 10 is contained in a suitable housing 50 which carries a small eyelet or hook 52. The detonator component used, e.g. a detonator 54 embedded in a booster explosive 56, is attached to the housing 50 in any appropriate way. A cord, not shown, attached to the eyelet or hook is used as a suspension arrangement whereby the combination of the module and the booster can be lowered into a blast hole at a blasting site. The housing 50 protects the module 10 from the ingress of liquids and against mechanical shock.
[0028] Figure 3 shows a blast site 60 which includes a plurality of boreholes 62. A control device 64 is connected to an output antenna 66 which is looped around the blast site and the boreholes. The control device, which controls the blasting process, includes a processor 68, a display 70, a keyboard or any other input device 72 connected to the processor, a key input 74 without which the processor is inoperative, a transmitting amplifier 76 which is connected to the loop antenna 66 and a radio frequency transmitter/receiver 78 for communication purposes with other blasting equipment via an antenna 80.
[0029] Each borehole 62 contains explosive material and one or more blasting modules with attendant detonators and boosters, according to requirement.
[0030] Each module is supplied to a user point in a non-powered state. Typically the module is supplied with the battery 26 separate from the other components.
[0031] The battery 26 may be disconnected from the remainder of the circuit electronically or by means of a physical switch. Alternatively the battery may be attached to the remainder of the module by a user. A battery pull tab could be used to connect the battery to a circuit or a switch in the module could be activated, when necessary, by a user.
[0032] A printed barcode, rfid or an internal identifier stored in one or both of the processors is used for tracking purposes. The identifier which is assigned to the module may be unique for a particular blast and may be assigned by a programmer. Alternatively the identifier may be unique in an absolute sense and may be an identifier which is supplied under factory conditions.
[0033] As is shown in Figure 1 the module 10 optionally includes a programming connector 82. By connecting a suitable programming unit to the connector an electronic latching switch can be activated to power the module. It is also possible to activate the module using a radio or magnetic signal but this is less desirable for the capability of activation over a distance inherently reduces the safety characteristics of the module.
[0034] Firing time information for the module is supplied to the programming connector 80 by means of a programming machine. This can happen at any appropriate time before a fire command is sent to the module. The firing time (delay time) could be pre-programmed in a factory environment. Commands which are sent via the programming connector 82 make use of appropriate acknowledgement and cyclic redundancy checks to ensure proper receipt of the commands. In another approach delay time information, originated from a programming machine, is supplied to the module in a wireless manner, for example from the control device 64 to the receiver 14 using a magnetic signal - this can be done reliably and effectively using a magnetic signal which can propagate through a rock body even once the module has been deployed in a blast hole. As communication between the control unit and the module is in one direction only each signal which is transmitted to the module should make use of forward error correction techniques. Alternatively or additionally each signal should be repeated at least once to enhance reliability.
[0035] The output of the receiver 14 is directed to each processor. An important aspect of this invention is that the processors must execute a predetermined processing interactive relationship in order for reliable firing of the detonator to take place. Various techniques can be adopted in this respect and the scope of the invention is by no means limited to the following examples. In one instance, as shown in Figure 1 , each processor controls a separate, series-connected fire switch i.e. the transistors 40 and 42 respectively which are in series with the energy storage capacitor 24. Alternatively or additionally, commands between the processors 18 and 20 must be validated. A communications link 90 between the processors enables each processor to verify the state of the other processor. Another technique requires the removal of a controlled electrical short circuit over the output of the capacitor 24. Separate commands may be required for each processor so that each processor produces a predetermined output signal which leads to firing of the detonator. The commands are preferably suitably encoded but the use of a preamble, forward error correction and a cyclic redundancy check is desirable to ensure reliable command reception.
[0036] In an alternative or additional approach a command transmitted by the control device 64 is repeated at least once but preferably a number of times. When this occurs each successive command is identical to a preceding command but contains time information to enable the command to be distinguished from the preceding command. By way of example only four identical ARM commands may be transmitted at spaced time intervals. Thereafter, subject to validation and conventional control aspects, four FIRE commands may be transmitted in succession at fixed time intervals. The FIRE commands may be distinguished from one another by means of information stored in the processors beforehand. For example a first fire command may be "FIRE + 3"; a second fire command may be "FIRE + 2"; a third fire command may be "FIRE + 1 "; and a fourth fire command may be "FIRE". Receipt of any of these commands, suitably interpreted by one or both processors means that firing must take place after three delay periods, two delay periods, one delay period, and zero delay period, as the case may be. Thus receipt of only one fire command is sufficient to cause firing to take place at a desired time. The fire commands thus contain data relating to an offset time to be added to a countdown sequence upon reception. By modifying the offset time which is sent with each successive fire command receipt of any one fire command results in an accurate execution thereof i.e. in an accurately timed firing event. Similarly, substantially identical arm commands can be distinguished from each other. For calibration purposes, substantially identical START_CALIBRATE and STOP CALIBRATE commands may respectively be distinguished from each other.
[0037] At least one of the processors 18 and 20 includes a software timer which generates a delay period during which detonator firing is prohibited and prevented. This can be done by directly connecting the terminals 30 to each other or by introducing an open circuit into the firing circuit, during the deployment period. A similar safeguard can be achieved by making use of a hardware delay timer.
[0038] If the detonator uses a fuse as an initiation element then the resistance of the fuse may be tested and reported to the programming unit which is connected to the programming connector 82, during an installation phase. Other self-tests and diagnostic tests such as the voltage of the battery 26, firmware revisions and checksums of firmware and cyclic redundancy checks, can also be implemented. If the detonator is electronic, commands may be sent to the detonator to establish the status and efficacy of the electronic detonator.
[0039] The module preferably enters a low power state after a user-settable time delay if no wireless commands are received. The receiver circuit may optionally be turned off at the same time. At user-settable intervals the receiver 14 is powered for a user-settable period during which the receiver is responsive to a signal from the control device. This technique helps to conserve energy consumption. Receipt of a control signal during a powered interval might act to postpone a following sleep period or, equivalently, extend the powered interval - this is useful for example if a blast is to be commenced or a sequence of commands is to be sent to the modules and, during that interval, the modules must be responsive to all commands.
[0040] The use of an ARM command has been referred to. This signal is transmitted to the processors by the receiver if a time period is required for the charging of the capacitor 24 or if preparatory commands must be sent to the detonator (for example). Upon receipt of an ARM command one or both processors may execute a timing interval. If a FIRE command is not forthcoming during the timing interval the module may again enter a safe state, for example by sending specific commands to the detonator component, so that the detonator component cannot be fired. The capacitor 24, if charged during this period, can alternatively or additionally be discharged.
[0041] The control device may also be operable to transmit a disarm command which operates in a similar manner to place the module in a safe state.
[0042] Commands to the processors may be repeated to enhance reliability and forward error correction techniques may be employed, as appropriate.
[0043] Prior to each module/detonator assembly being placed in a blast hole a user connects each module to the programming unit to enable the module. The programming unit supplies the module with a fire command which is unique to the given blast, and a firing time. Each blast hole is loaded with explosive, as desired, and one or more modules are placed in each blast hole. Subsequently the wire loop antenna 66 is placed around the blast zone (panel) and is connected to the control unit (blasting machine) which is in a safe location.
[0044] The control device, possibly under the control of a wired or wireless blast coordinating machine which is communication with the control unit, supplies an appropriate sequence of commands which, as indicated, may include a sequence of ARM commands followed by a sequence of FIRE commands.
[0045] Each processor, upon receipt of a first validated FIRE command, adds the supplied fire offset, in the FIRE command, to a local firing time and commences an adjusted firing countdown sequence. After receipt of one validated FIRE command no further wireless commands are processed. The antenna 2 and receiver 4 can be clamped to prevent interference that may occur during the blasting sequence.
[0046] Preferably the FIRE command includes a cryptographically secure blast identifier that must match an identifier previously loaded into the module via the programming connector 82 for the FIRE command to be considered as valid. In this way separate blasts may be programmed with different blast identifiers and initiated at different times by the control unit.
[0047] In an alternative approach the FIRE command which is required for initiation is supplied to the detonator by the programming unit which is connected to the programming connector. This allows the detonators to be shipped with no valid FIRE command. Another possibility is for the FIRE command to be randomly generated on site on a per blast basis using any suitable technique such as a cryptographically secure, pseudo random number generator in the programming unit.
[0048] The loop 66 may be tuned manually or automatically using appropriate techniques in order to achieve an appropriate output level so that effective coupling to the wireless detonator modules results. One such technique is to switch appropriately valued capacitors into an effective LC loop resonant circuit.
[0049] The required output voltage or power of the loop 66 may be calculated based on the depth of the wireless blasting modules, the expected attenuation due to the rock medium being blasted, a safety factor and the minimum receiver level required by the wireless blasting modules. This can be used as the basis for a "go/no-go" decision as to whether the modules will all satisfactorily receive the signal to blast. This is an important criterion as the communication to the detonators is unidirectional.

Claims

A wireless blasting module which includes a receiver which, in response to at least one magnetic control signal transmitted in a wireless manner from a control device, produces at least one output signal, at least first and second processors which process the at least one output signal, an energy source, terminals to which a detonator component is connectable and a switching arrangement which is operative in response to a predetermined processing relationship between the first and second processors thereby to connect the energy source to the terminals.
A blasting module according to claim 1 which includes a delay timer which inhibits the module from going into an operative mode in which blasting is possible, for a period which is commenced after deployment of the module in a blast system.
A blasting module according to claim 1 or 2 wherein the receiver is responsive to a plurality of control signals which are repeated at intervals and which contain substantially the same information but which include time-related information which enables successive signals to be differentiated from one another.
A blasting module according to claim 1 wherein at least one of the processors includes an oscillator which is calibrated in response to a command signal from the control device.
A blasting module according to any one of claims 1 to 4 which includes at least one unique identifier. A blasting module according to any one of claims 1 to 5 wherein the receiver operates using through-the-earth magnetic communication techniques and pulse code modulation. A blasting module according to claim 1 which includes first and second switches, which are connected in series with each other, the energy source and the detonator component, and which are operable respectively by the first and second processors. A blasting module according to claim 1 which includes a programming connector which receives firing time information from a programming machine. A blasting module according to claim 1 wherein the receiver is responsive to a magnetic signal from the control device thereby to receive firing time information from a programming machine. A blasting module according to claim 1 wherein the receiver is responsive to each of a plurality of successive commands, wherein each command is identical to a preceding command but contains time information to enable the command to be distinguished from the preceding command whereby receipt of only one command results in an accurate execution thereof. A blasting module according to claim 1 wherein the receiver is turned off after a user-settable time delay if no wireless commands are received and thereafter, at user-settable intervals the receiver is powered for a user- settable period during which the receiver is responsive to a signal from the control device. A blasting module according to claim 1 wherein upon receipt of an ARM command by the receiver at least one processor executes a timing interval and if a FIRE command is not received during the timing interval it is not possible to fire the detonator component. A combination comprising a housing, a suspension arrangement on the housing, a detonator module according to claim 1 in the housing, and a booster explosive in which the detonator component is embedded. A blasting system which includes a blast site, a plurality of boreholes at the site, an output antenna looped around the boreholes, a control device connected to the looped antenna, explosive material in each borehole, and at least one respective blasting module according to claim 1 in each borehole, and wherein the control device produces a magnetic control signal to establish unidirectional communication with each receiver, in the respective blasting modules.
PCT/ZA2011/000072 2010-11-04 2011-09-23 Wireless blasting module WO2012061850A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2012101113A AU2012101113A4 (en) 2010-11-04 2011-09-23 Wireless blasting module

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2010/07921 2010-11-04
ZA201007921 2010-11-04

Related Child Applications (1)

Application Number Title Priority Date Filing Date
AU2012101113A Division AU2012101113A4 (en) 2010-11-04 2011-09-23 Wireless blasting module

Publications (1)

Publication Number Publication Date
WO2012061850A1 true WO2012061850A1 (en) 2012-05-10

Family

ID=44947269

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2011/000072 WO2012061850A1 (en) 2010-11-04 2011-09-23 Wireless blasting module

Country Status (2)

Country Link
AR (1) AR083778A1 (en)
WO (1) WO2012061850A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104406469A (en) * 2014-10-15 2015-03-11 上海无线电设备研究所 Laser fuze signal processing circuit and laser fuze signal processing method
WO2015143501A1 (en) * 2014-03-27 2015-10-01 Orica International Pte Ltd Apparatus, system and method for blasting using magnetic communication signal
WO2015143502A1 (en) * 2014-03-27 2015-10-01 Orica International Pte Ltd Apparatus, system and method for blasting
WO2015199620A1 (en) * 2015-09-16 2015-12-30 Orica International Pte Ltd A wireless initiation device
WO2015161326A3 (en) * 2014-04-16 2016-02-25 Detnet South Africa (Pty) Limited A method of obtaining seismic information
EP3367051A3 (en) * 2013-12-02 2018-11-28 Austin Star Detonator Company Methods for wireless blasting
WO2020176939A1 (en) * 2019-03-04 2020-09-10 Voyager Innovations Pty Ltd Wireless detonation system
WO2020263193A1 (en) * 2019-06-27 2020-12-30 Orica International Pte Ltd Commercial blasting systems
CN112346112A (en) * 2020-09-18 2021-02-09 中国石油天然气集团有限公司 Well gun remote explosion system capacity expansion device and method and well gun remote explosion system
WO2021222947A1 (en) * 2020-04-29 2021-11-04 Detnet South Africa (Pty) Ltd Wireless detonator assembly
CN114279281A (en) * 2022-01-18 2022-04-05 北京伊拜科技有限责任公司 Detonation control method of wireless detonator detonation network
WO2022246481A1 (en) * 2021-05-20 2022-11-24 Detnet South Africa (Pty) Ltd Apparatus for use in a wireless detonator system
CN115790298A (en) * 2022-10-31 2023-03-14 维纳芯科技(无锡)有限公司 Electronic control module for geological exploration electronic detonator and detonation control method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4685396A (en) 1984-09-04 1987-08-11 Imperial Chemical Industries Plc Method and apparatus for safer remotely controlled firing of ignition elements
US4884506A (en) * 1986-11-06 1989-12-05 Electronic Warfare Associates, Inc. Remote detonation of explosive charges
US6105688A (en) * 1998-07-22 2000-08-22 Schlumberger Technology Corporation Safety method and apparatus for a perforating gun
US20040196605A1 (en) * 2003-02-04 2004-10-07 Don Dinn Passive inductive switch
US20080083344A1 (en) * 2005-11-14 2008-04-10 Deguire Daniel R Safe and arm system for a robot
US20080227390A1 (en) * 2007-03-16 2008-09-18 Magneto-Inductive Systems Limited Method and system for relaying signals from a magneto-inductive system through a voice-band system
US20080307993A1 (en) 2004-11-02 2008-12-18 Orica Explosives Technology Pty Ltd Wireless Detonator Assemblies, Corresponding Blasting Apparatuses, and Methods of Blasting
US20100170411A1 (en) 2006-09-19 2010-07-08 Mas Zengrange (Nz) Ltd Remote initiator for the remote initiation of explosive charges

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4685396A (en) 1984-09-04 1987-08-11 Imperial Chemical Industries Plc Method and apparatus for safer remotely controlled firing of ignition elements
US4884506A (en) * 1986-11-06 1989-12-05 Electronic Warfare Associates, Inc. Remote detonation of explosive charges
US6105688A (en) * 1998-07-22 2000-08-22 Schlumberger Technology Corporation Safety method and apparatus for a perforating gun
US20040196605A1 (en) * 2003-02-04 2004-10-07 Don Dinn Passive inductive switch
US20080307993A1 (en) 2004-11-02 2008-12-18 Orica Explosives Technology Pty Ltd Wireless Detonator Assemblies, Corresponding Blasting Apparatuses, and Methods of Blasting
US20080083344A1 (en) * 2005-11-14 2008-04-10 Deguire Daniel R Safe and arm system for a robot
US20100170411A1 (en) 2006-09-19 2010-07-08 Mas Zengrange (Nz) Ltd Remote initiator for the remote initiation of explosive charges
US20080227390A1 (en) * 2007-03-16 2008-09-18 Magneto-Inductive Systems Limited Method and system for relaying signals from a magneto-inductive system through a voice-band system

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3367051A3 (en) * 2013-12-02 2018-11-28 Austin Star Detonator Company Methods for wireless blasting
US11009331B2 (en) 2013-12-02 2021-05-18 Austin Star Detonator Company Method and apparatus for wireless blasting
EP3553459A1 (en) * 2013-12-02 2019-10-16 Austin Star Detonator Company Methods for wireless blasting
US10429162B2 (en) 2013-12-02 2019-10-01 Austin Star Detonator Company Method and apparatus for wireless blasting with first and second firing messages
JP2017512968A (en) * 2014-03-27 2017-05-25 オリカ インターナショナル プライベート リミティド Apparatus, system and method
WO2015143502A1 (en) * 2014-03-27 2015-10-01 Orica International Pte Ltd Apparatus, system and method for blasting
JP2017510785A (en) * 2014-03-27 2017-04-13 オリカ インターナショナル プライベート リミティド Apparatus, system and method
WO2015143501A1 (en) * 2014-03-27 2015-10-01 Orica International Pte Ltd Apparatus, system and method for blasting using magnetic communication signal
EP3123104A4 (en) * 2014-03-27 2017-11-01 Orica International Pte Ltd Apparatus, system and method for blasting
EP3123103A4 (en) * 2014-03-27 2017-11-01 Orica International Pte Ltd Apparatus, system and method for blasting using magnetic communication signal
US10113843B2 (en) 2014-03-27 2018-10-30 Orica International Pte Ltd Apparatus, system and method for initiation of buried explosives
AU2015234708B2 (en) * 2014-03-27 2020-01-02 Orica International Pte Ltd Apparatus, system and method for blasting using magnetic communication signal
US10295323B2 (en) 2014-03-27 2019-05-21 Orica International Pte Ltd. Apparatus, system and method for blasting using magnetic communication signal
RU2697980C2 (en) * 2014-03-27 2019-08-21 Орика Интернэшнл Пте Лтд Apparatus, system and method
AU2015234603B2 (en) * 2014-03-27 2020-01-02 Orica International Pte Ltd Apparatus, system and method for blasting
US20170074630A1 (en) * 2014-03-27 2017-03-16 Orica International Pte Ltd Apparatus, System And Method For Blasting Using Magnetic Communication Signal
RU2710580C2 (en) * 2014-03-27 2019-12-27 Орика Интернэшнл Пте Лтд Apparatus, system and method
WO2015161326A3 (en) * 2014-04-16 2016-02-25 Detnet South Africa (Pty) Limited A method of obtaining seismic information
CN104406469A (en) * 2014-10-15 2015-03-11 上海无线电设备研究所 Laser fuze signal processing circuit and laser fuze signal processing method
WO2015199620A1 (en) * 2015-09-16 2015-12-30 Orica International Pte Ltd A wireless initiation device
EA037944B1 (en) * 2015-09-16 2021-06-10 Орика Интернэшнл Пте Лтд Wireless initiation device
AU2015280721B2 (en) * 2015-09-16 2021-07-22 Orica International Pte Ltd A wireless initiation device
AU2015280721C1 (en) * 2015-09-16 2022-10-27 Orica International Pte Ltd A wireless initiation device
US11248895B2 (en) 2015-09-16 2022-02-15 Orica International Pte Ltd Wireless initiation device
WO2020176939A1 (en) * 2019-03-04 2020-09-10 Voyager Innovations Pty Ltd Wireless detonation system
US11867493B2 (en) 2019-03-04 2024-01-09 Voyager Innovations Pty Ltd Wireless detonation system
AU2020230556B2 (en) * 2019-03-04 2022-02-17 Voyager Innovations Pty Ltd Wireless detonation system
CN113544461A (en) * 2019-03-04 2021-10-22 航行者创新私人有限公司 Wireless detonation system
WO2020263193A1 (en) * 2019-06-27 2020-12-30 Orica International Pte Ltd Commercial blasting systems
CN114342285A (en) * 2019-06-27 2022-04-12 澳瑞凯国际有限公司 Commercial blasting system
US12078467B2 (en) 2019-06-27 2024-09-03 Orica International Pte Ltd Commercial blasting systems
WO2021222947A1 (en) * 2020-04-29 2021-11-04 Detnet South Africa (Pty) Ltd Wireless detonator assembly
US11874098B2 (en) 2020-04-29 2024-01-16 Detnet South Africa (Pty) Ltd Wireless detonator assembly
CN112346112A (en) * 2020-09-18 2021-02-09 中国石油天然气集团有限公司 Well gun remote explosion system capacity expansion device and method and well gun remote explosion system
CN112346112B (en) * 2020-09-18 2024-05-28 中国石油天然气集团有限公司 Capacity expanding device and method of well cannon remote explosion system and well cannon remote explosion system
WO2022246481A1 (en) * 2021-05-20 2022-11-24 Detnet South Africa (Pty) Ltd Apparatus for use in a wireless detonator system
CN114279281A (en) * 2022-01-18 2022-04-05 北京伊拜科技有限责任公司 Detonation control method of wireless detonator detonation network
CN114279281B (en) * 2022-01-18 2023-03-21 北京伊拜科技有限责任公司 Detonation control method of wireless detonator detonation network
CN115790298A (en) * 2022-10-31 2023-03-14 维纳芯科技(无锡)有限公司 Electronic control module for geological exploration electronic detonator and detonation control method
CN115790298B (en) * 2022-10-31 2023-11-14 维纳芯科技(无锡)有限公司 Electronic control module for geological exploration electronic detonator and detonation control method

Also Published As

Publication number Publication date
AR083778A1 (en) 2013-03-20

Similar Documents

Publication Publication Date Title
WO2012061850A1 (en) Wireless blasting module
AU2021254605B2 (en) A wireless initiation device
KR100616806B1 (en) System for the initiation of rounds of individually delayed detonators
US7975612B2 (en) Constant-current, rail-voltage regulated charging electronic detonator
CA2645206C (en) Wireless electronic booster, and methods of blasting
ES2335101T3 (en) PROCEDURE FOR IDENTIFYING AN UNKNOWN OR UNMARKED SLAVE DEVICE AS IN AN ELECTRONIC FLYING SYSTEM.
KR20010031865A (en) Controlled electromagnetic induction detonation system for initiation of a detonatable material
US5159149A (en) Electronic device
US20230296364A1 (en) Improved communications in electronic detonators
US11105600B1 (en) Identification method in a detonator network
AU2012393032B2 (en) Remote initiator receiver
CN105066802A (en) Remote control initiation system
AU2016354618B2 (en) Wireless detonator
JP2019066091A (en) Detonator
US20050011390A1 (en) ESD-resistant electronic detonator
AU2012101113A4 (en) Wireless blasting module
EP1644689B1 (en) Detonator arming
WO2006055991A1 (en) Detonator
WO2021229597A1 (en) An electronic system for controlled sequential detonation and method thereof
EP4143500A1 (en) Wireless detonator assembly
AU2002100859A4 (en) Electronic detonator buffered connection device
MXPA00004358A (en) Controlled electromagnetic induction detonation system for initiation of a detonatable material

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11782356

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11782356

Country of ref document: EP

Kind code of ref document: A1