Claims
- 1. A method of activating a tool, comprising:
checking an authorization code of a user to verify that the user has access to activate the tool; receiving data pertaining to an environment around the tool; and enabling activation of the tool in response to the authorization code and the data indicating that the environment around the tool meets predetermined one or more criteria for activation of the tool.
- 2. The method of claim 1, further comprising:
receiving a user command to activate the tool; and sending an activate command to the tool if activation of the tool is enabled.
- 3. The method of claim 2, wherein sending the activate command comprises sending an encrypted activate command.
- 4. The method of claim 3, further comprising the tool decrypting the encrypted activate command.
- 5. The method of claim 4, wherein decrypting the encrypted activate command is performed using a key stored in the tool.
- 6. The method of claim 1, further comprising receiving the authorization code of the user from information stored on a smart card.
- 7. The method of claim 6, wherein receiving the authorization code further comprises receiving a personal identification number code from the user in addition to the information stored on the smart card.
- 8. The method of claim 6, wherein receiving the information stored on the smart card comprises receiving a digital signature from the smart card.
- 9. The method of claim 1, further comprising:
providing sensors in the tool; and communicating data indicating the environment from the sensors to a surface unit.
- 10. The method of claim 9, wherein the tool contains an explosive, the method further comprising providing additional sensors at a well surface to detect detonation of the explosive.
- 11. The method of claim 1, further comprising receiving a command to activate the tool from a remote site.
- 12. The method of claim 11, wherein receiving the command from the remote site comprises receiving the command over a wireless link.
- 13. The method of claim 12, wherein receiving the command over the wireless link comprises receiving the command over a radio frequency link.
- 14. A tool, comprising:
a section having an explosive; a safety sub having a switch; a first electrical link coupled to the switch and a second electrical link coupled between the switch and the section; and the switch adapted to isolate the first and second electrical links when the switch is in the open position to disable electrical arming of the section.
- 15. The tool of claim 14, wherein the section comprises a gun.
- 16. A system for activating a tool, comprising:
a controller having an interface to communicate with the tool, the controller further having a security input unit adapted to receive an authorization code, the controller adapted to verify the authorization code; and the interface adapted to receive data pertaining to an environment of the tool.
- 17. The system of claim 16, wherein the controller is adapted to enable activation of the tool in response to verifying the authorization code and data pertaining to the environment of the tool.
- 18. The system of claim 16, further comprising a communications interface adapted to wirelessly communicate with a remote site.
- 19. The system of claim 18, wherein the communications interface is adapted to communicate with the remote site using radio frequency signaling.
- 20. The system of claim 16, wherein the security input unit comprises a smart card reader adapted to receive information stored on a smart card.
- 21. The system of claim 20, wherein the security input unit is further adapted to receive a password from a user.
- 22. An assembly comprising:
an activation system having an interface and a security input unit; and a tool coupled to the interface of the activation system, the security input unit adapted to receive an authorization code, the interface adapted to receive data relating to an environment of the tool.
- 23. The assembly of claim 22, wherein the activation system is adapted to enable activation of the tool based on the authorization code and the environment data.
- 24. The assembly of claim 23, wherein the activation system is adapted to receive an activate indication from a user, and to send an activate command to the tool in response to activation being enabled.
- 25. The assembly of claim 24, wherein the tool comprises an explosive device.
- 26. The assembly of claim 25, wherein the tool comprises a safety sub adapted to electrically isolate a section of the tool containing the explosive device.
- 27. The assembly of claim 26, wherein the safety sub comprises a switch set to an open position to isolate the section of the tool containing the explosive.
- 28. The assembly of claim 22, wherein the tool comprises sensors adapted to communicate the environment data to the activation system.
- 29. The assembly of claim 28, wherein the tool comprises a perforating tool.
- 30. The assembly of claim 29, further comprising a sensor adapted to be placed at an earth surface to detect firing of the perforating tool.
- 31. The assembly of claim 22, further comprising a remote system adapted to communicate wirelessly with the activation system.
- 32. The assembly of claim 31, wherein the remote system is adapted to communicate an activate command to the activation system.
- 33. The assembly of claim 22, wherein the security input unit comprises a smart card reader.
- 34. A method of handling a tool containing a section having an explosive device, comprising:
providing a safety sub between the section and an input of the tool; and setting a switch in the safety sub to an open position to electrically isolate the section from the input.
- 35. The method of claim 34, further comprising transporting the tool in a prearmed state with the explosive device connected in the section.
- 36. A method of activating a tool containing an explosive, comprising:
receiving, by a security input device, an authorization code associated with a user; verifying, based on the authorization code, that the user is authorized to activate the tool containing the explosive; and sending, in response to user input, one or more messages to the tool containing the explosive to activate the tool.
- 37. The method of claim 36, wherein receiving the authorization code by the security input device comprises receiving the authorization code from one of a smart card reader and a biometric input device.
- 38. The method of claim 36, wherein the tool comprises a perforating gun, and wherein sending the one or more messages comprises sending a first message to arm the perforating gun and sending a second message to fire the gun.
- 39. The method of claim 36, wherein sending the one or more messages comprises sending one or more encrypted messages.
- 40. The method of claim 39, further comprising the tool decrypting the one or more encrypted messages.
- 41. The method of claim 36, wherein the tool has plural guns, each gun having a unique code, and wherein sending the one or more messages comprises sending the one or more messages containing the unique codes.
- 42. The method of claim 41, wherein sending the one or more messages comprises sending one message to all the guns.
- 43. The method of claim 42, further comprising providing a delay element in each of the guns to specify a delay from receipt of the message to firing of the gun,
wherein the delay in one gun is different form the delay in at least another gun.
- 44. The method of claim 36, further comprising providing plural access levels, wherein verifying that the user is authorized based on the authorization code comprises determining one of the plural access levels associated with the user.
- 45. A system comprising:
a security input device adapted to receive an authorization code of a user; a controller adapted to verify, based on the authorization code, if the user is allowed access to activate a tool containing an explosive device; and an interface adapted to be coupled to a link to the tool containing the explosive device, the interface adapted to send an activation message to the tool under control of the controller.
- 46. The system of claim 45, wherein the security input device comprises one of a smart card reader and a biometric input device.
- 47. The system of claim 45, further comprising a storage device to store authorization information, the controller adapted to compare the authorization code with the authorization information in the storage device.
- 48. The system of claim 45, wherein the activation message comprises an encrypted activation message.
- 49. The system of claim 45, wherein the activation message comprises a message to fire a perforating gun in the tool.
- 50. An article comprising at least one storage medium containing instructions for controlling a tool having an explosive, the instructions when executed causing a system to:
receive, through a security input device, an authorization code associated with a user; verify, based on the authorization code, that a user is allowed to activate the tool having the explosive; and generate one or more messages to send to the tool having the explosive for activating the tool.
- 51. A tool comprising:
a gun having an explosive and a sensor, the sensor adapted to communicate data over a communications line coupled to the tool.
- 52. The tool of claim 51, wherein the gun further comprises at least another sensor adapted to communicate data over the communications line.
- 53. The tool of claim 51, wherein the sensor is selected from the group consisting of a temperature sensor, pressure sensor, fluid density sensor, moisture detector, strain-gauge bridge sensor, acoustic sensor, vibration sensor, sand detection sensor, water detection sensor, scale detector, viscosity sensor, bubble point sensor, composition sensor, infrared sensor, gamma ray sensor, H2S sensor, CO2 sensor, casing collar locator, position sensor, and orientation sensor.
- 54. The tool of claim 53, wherein the gun has at least another sensor selected from the group.
- 55. The tool of claim 51, further comprising another gun having an explosive and a sensor.
- 56. A method for use in a well, comprising:
lowering a tool having a gun into the well; providing a sensor in the gun; and communicating data from the sensor over a communications line coupled to the tool.
- 57. The method of claim 56, further comprising:
providing another gun in the tool; and providing another sensor in the other gun.
- 58. The method of claim 56, wherein providing the sensor comprises providing a sensor selected from the group consisting of a temperature sensor, pressure sensor, fluid density sensor, moisture detector, strain-gauge bridge sensor, acoustic sensor, vibration sensor, sand detection sensor, water detection sensor, scale detector, viscosity sensor, bubble point sensor, composition sensor, infrared sensor, gamma ray sensor, H2S sensor, CO2 sensor, casing collar locator, position sensor, and orientation sensor.
- 59. The method of claim 56, further comprising providing another sensor in the gun.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This is a continuation-in-part of U.S. Ser. No. 09/997,021, filed Nov. 28, 2001, which is a continuation-in-part of U.S. Ser. No. 09/179,507, filed Oct. 27, 1998.
Continuation in Parts (2)
|
Number |
Date |
Country |
Parent |
09997021 |
Nov 2001 |
US |
Child |
10076993 |
Feb 2002 |
US |
Parent |
09179507 |
Oct 1998 |
US |
Child |
09997021 |
Nov 2001 |
US |