This disclosure generally relates to explosives, and more particularly, to a remote explosive detonation system for explosives and a method of operating the same.
Explosives used in military combat may be initiated by detonation devices. Due to the destructive nature of explosives, these detonation devices may incorporate various safety features to avoid premature detonation. For example, a shock tube is a type of detonation device that transmits a detonation signal to a remotely located explosive using a pressure signal. The shock tube may be made of non-conductive materials, which are not generally susceptible to premature detonation caused by stray electro-magnetic radiation.
According to one embodiment of the disclosure, a remote explosive detonation system includes a transmitter and at least one receiver configured with a detonator. The transmitter transmits an electro-magnetic signal with a transmitter identification code that may be received by the receiver. The receiver initiates the detonator if the transmitter identification code matches an internal identification code stored in the receiver.
Some embodiments of the disclosure may provide numerous technical advantages. For example, one embodiment of the remote explosive detonation system may provide a relatively reliable approach for remotely detonating explosives that reduces detection of the source of the detonation. Known detonation systems use elongated shock tubes that convey a detonation signal using an impulse blast of pressurized air. These shock tubes, however, often leave a residual trail indicating the source of the explosive blast, which may compromise the security of personnel using the explosives. The remote explosive detonation system of the present disclosure uses a wireless signal that may be substantially difficult to trace following detonation, thus alleviating security issues associated with enemy response following use of remotely configured explosives. The remote explosive detonation system may be relatively quicker to implement than known detonation systems that require spooling shock tube from the explosive to its initiation point. Additionally, the location of the initiation point may be concealed more effectively then known explosive detonation systems using shock tubes that may leave a residual trail of shock tube material following detonation of the explosive
Other technical advantages will be readily apparent to one of ordinary skill in the art from the following figures, descriptions, and claims. Moreover, while specific advantages have been enumerated above, various embodiments may include all, some, or none of the enumerated advantages.
A more complete understanding of embodiments of the disclosure will be apparent from the detailed description taken in conjunction with the accompanying drawings in which:
A shock tube is a detonation device that may be used to detonate an explosive, such as cyclotrimethylene trinitramine (C4). These shock tubes, however, may have drawbacks. For example, following detonation of the explosive, a shock tube may leave a residual trail indicating the location of the triggering device.
Transmitter 12 comprises a handheld transmitter housing 16 that is configured with an antenna 18, transmitter docking connector 20, an operating mode dial 22, and one or more trigger buttons 24. Transmitter housing 16 has a shape suitable for handling by the hand of a user. Transmitter 12 may have multiple independently operated actuation mechanisms that are simultaneously actuated for detonating the explosive. In this manner, the possibility of inadvertent detonation of the explosive may be reduced. In the particular embodiment shown, two trigger buttons 24 are implemented. Other embodiments may include any suitable type and quantity of actuation mechanisms, such as two or more levers, or one button and one lever.
Receiver 14 comprises a receiver housing 30 that is configured with a receiver docking connector 32, an arming button 34, an arming/safety pin 36, an indicator light 38, and a detonator 40. Receiver docking connector is engageable with transmitter docking connector 20. In the particular embodiment shown, receiver housing 30 has outer dimensions of approximately 2.0 inches by 2.0 inches by 1.0 inches. In other embodiments, receiver housing 30 may have any suitable size.
Arming/safety pin 36 is removable from receiver housing 30. Detonation is prevented when arming/safety pin 36 is engaged in receiver housing 30. Once arming/safety pin 36 is removed, receiver 14 may be armed and ready to initiate detonation upon a valid signal from the transmitter 12. Arming button 34 may be spring loaded such that removal of the arming/safety pin 36 allows the arming button 34 to project outwardly from the receiver housing 30. The indicator light 38 may be any suitable source of light, such as a light emitting diode (LED) and may provide visual indication of the armed status of the receiver 14. In one embodiment, the indicator light 38 emits only infrared light. In this manner, indicator light 38 may be visible only through night vision goggles.
Detonator 40 is configured to explode upon receipt of a valid signal from transmitter 12. In one embodiment, detonator 40 includes only secondary explosive materials. That is, detonator 40 may be relatively free of any primary explosive material that may be susceptible to premature detonation. In one embodiment, detonator 40 is an exploding foil initiator (EFI), such as a low energy exploding foil initiator (LEEFI), that may be initiated by an electrical pulse of energy.
Transmitter 12 may include any suitable electrical circuit for generating a signal that is transmitted through antenna 18. In one embodiment, transmitter 12 uses a spread spectrum signal transmission technique to transmit the signal, which may yield a low probability of intercept (LPI), a low probability of jamming (LPJ), and/or a low probability of spoofing (LPS). The spread spectrum signal transmission technique is a frequency hopping process in which the transmitted signal may be alternatively transmitted over differing frequencies. Because the transmitted electro-magnetic energy is spread over a relatively wide frequency range, the signal may be relatively difficult to jam, spoof, or intercept. In another embodiment, the frequency hopping process used to generate the spread spectrum signal may be proprietary to reduce unwanted reception of the transmitted signal from others. In another embodiment, the transmitter 12 and receiver 14 may use forward error correction (FEC) techniques to further reduce susceptibility to unwanted electro-magnetic radiation. In another embodiment, information may be transferred from transmitter 12 to receiver 14 using data packets. These data packets may be deciphered by receiver according to a preamble and/or a post-amble of the received data packet to verify proper receipt of signals from transmitter 12. In another embodiment, receiver 14 may perform a hash function, such as a cyclic redundancy check (CRC) to verify proper receipt of signals from transmitter 12. In another embodiment, transmitter 12 may transmit commands to receiver 14 using specific command words, such as logical words having greater than 65,000 combinations to reduce the possibility of misinterpretation of commands by receiver 14.
The transmitter 12/receiver 14 combination may have any suitable range that provides a relatively safe distance of transmitter 12 from receiver 14 when explosive is detonated. In a particular embodiment, an effective transmission range of greater than approximately 50 meters may provide sufficient protection from shrapnel or other debris caused by the detonation of explosives commonly used with remote explosive detonation system 10.
Receiver 14 may include any suitable electrical circuit for receiving and processing the transmitted signal from transmitter 12. Receiver 14 includes an antenna 68 that may be disposed within receiver housing for receiving the transmitted signal. In one embodiment, antenna 68 is a patch antenna. According to the teachings of the present disclosure, memory 66 of receiver 14 stores a receiver identification code 70 that may be compared with a transmitter identification code 72 that is modulated onto the signal transmitted by transmitter 12. Only when transmitter identification code 72 matches receiver identification code 70 is detonation of detonator 40 allowed.
Modifications, additions, or omissions may be made to remote explosive detonation system 10 without departing from the scope of the disclosure. The components of remote explosive detonation system 10 may be integrated or separated. For example, The transmitter 12 may be implemented as a stand-alone device or may form a portion of another larger system. Moreover, the operations of remote explosive detonation system 10 may be performed by more, fewer, or other components. For example, the operations of transmitter 12 may generate an electro-magnetic signal that is relayed through a wireless repeater, such that receiver 14 receives the transmitted electro-magnetic signal from the wireless repeater. Additionally, operations of remote explosive detonation system 10 may be performed using any suitable logic comprising software, hardware, and/or other logic. As used in this document, “each” refers to each member of a set or each member of a subset of a set.
In act 102, operating mode dial 22 is set to the programming mode. When the programming mode is selected, actuation of any receivers 14 may be inhibited. In this manner, premature detonation may be reduced.
In act 104, Receiver 14 is docked to transmitter 12 by coupling receiver docking connector 32 to transmitter docking connector 20. In one embodiment, receiver 14 includes an indicator light 38 that indicates its operating condition. For example, indicator light 38 may become illuminated when receiver 14 is docked on transmitter 12 to indicate that its circuit 52 is in an operational state and the battery is supplying ample electrical power for its operation.
In act 106, identification code 72 stored in memory 64 of transmitter 12 is transferred to the memory 66 of receiver 14. In one embodiment, commencement of identification code transferal is provided by actuation of trigger buttons 24. In other embodiments, transferal of transmitter identification code 72 commences when receiver docking connector 32 is coupled to transmitter docking connector 20. In one embodiment, indicator light may generate a blinking pattern indicating proper receipt and storage of identification code 70 in its internal memory 66. In another embodiment, the blinking pattern may be indicative of the status of the receiver's battery 56. For example, indicator light 38 may blink twice to indicate a fully charged battery while a three blink sequence may indicate a partially charged battery 56.
In act 108, receiver 14 is removed from transmitter 12 and coupled to a suitable explosive device. Receiver 14 may be coupled to various types of explosive devices using one of several accessory clips 44 that may be mounted on receiver 14. In one embodiment, receiver 14 may incorporate a delay activation mechanism that inhibits detonation for a period of time following removal from transmitter 12. In one embodiment, this delay time may be approximately 4 seconds.
In act 110, if more than one receiver 14 is to be detonated simultaneously, acts 102 through 108 may be repeated with another receiver 14. If only one receiver 14 is to be detonated, however, processing continues at act 112.
in act 112, operating mode dial 22 may be moved from the programming mode to a test mode. While operating mode dial 22 is in the test mode and the one or more receivers 14 are electrically decoupled from transmitter 12, actuation of trigger buttons 24 causes indicator light 38 to generate a visual indication that its associated receiver 14 has properly received and its stored identification code 70 matches that of the transmitter identification code in the transmission signal. While in the test mode of operation, detonator 40 is inhibited from detonation. Thus, receivers 14 may be verified for proper operation with transmitter 12 following removal from transmitter docking connector 20.
In act 114, operating mode dial 22 may be moved to the disarm mode. While in the disarm mode of operation, actuation of trigger buttons 24 causes one or all of the one or more receivers 14 to be disarmed. In one embodiment, disarming of receivers 14 may be accomplished by erasing its stored internal identification code 70. In this manner, receipt of an ensuing transmission signal including an identification code will not cause the receiver 14 to detonate the detonator 40.
In act 115, the one or more receivers 14 go to a storage mode. In the storage mode, the one or more receivers 14 may not detonate from detonation signals transmitted by transmitter 12, but may be programmed by transmitter 12 in the future according to acts 102, through 108.
In act 116, operating mode dial 22 is moved from the programming mode to the operation mode. In the operation mode, the trigger buttons 24 are no longer inhibited from generating a signal that may be used to detonate each of the receivers 14 programmed in acts 102 through 108.
In act 118, the one or more receiver 14 is detonated by transmitter 12 by actuating trigger buttons 24. At this point, remote explosive detonation system 10 has remotely detonated an explosive and the process ends in act 120.
Remote explosive detonation system 10 may have multiple safety mechanisms that reduce premature detonation. For example, the signal transmitted by transmitter 12 may include a spread spectrum transmission, forward error correction, layered coding, and/or error detection techniques to reduce interception or jamming by others. Additionally, detonator 40 may be void of any primary explosive material that is generally prone to premature detonation. Thus, remote explosive detonation system 10 may provide a relatively secure method for detonating one or more explosive devices from a distance using radio frequency transmission techniques in relatively reliable manner.
Although the present disclosure and its advantages have been described in detail, it should be understood that various changes, substitutions, and alterations can be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims.
This application claims priority to U.S. Provisional Patent Application Ser. No. 61/002,476, entitled “REMOTE DETONATION SYSTEM,” which was filed on Nov. 9, 2007.
Number | Date | Country | |
---|---|---|---|
61002476 | Nov 2007 | US |