This invention relates generally to remote firing systems and, more particularly, to safety communication of remote firing systems.
Blasting machines are devices used to trigger detonators. A detonator, in turn, triggers a main charge explosive. The use of blasting machines created a significantly safer and more efficient environment for the detonation of explosives in mining, construction, and military applications. Blasting machines replace the traditional lit fuse method of initiating explosives. Blasting machines typically use a lead line comprised of a pair of copper wires or a shock tube. The use of a blasting machine increases safety by allowing a greater standoff between the operator and the explosive charge, a shorter lag time between the initiation of the firing sequence and the actual detonation of the explosive, as well as a reduction in the number of accidental ignition sources that could trigger a blast unintentionally. Blasting machines make detonation of explosives more efficient by creating a more reliable and consistent source of initiation, reducing the amount and cost of materials used, as well as allowing for faster setup thereby reducing overall manpower time as compared to traditional fuses.
A danger area 124 A-C is associated with loose rock, known as fly rock, which can be thrown to great distances by the explosive force released upon detonation of the shot 118 A-C. To ensure safety, the blasting machine and operator 116 A-C must be located outside of the danger area 124 A-C created by the explosion. Similarly, vehicles 114 A-C and other mine employees 112 A-B must also be located outside of the danger area 124 A-C of each shot 118 A-C. Mine personnel (not shown), known as spotters, guard areas of ingress that cannot be observed by the blasting machine operator, preventing other mineworkers or equipment from entering the danger area 124A-C during a shot. As can be appreciated by
It is desirable to minimize the amount of time a mine is evacuated (downtime) because of the great expense associated with a non-producing mine. Shooting multiple shots close in time minimizes downtime. Typically, separate shots 118 A-C will use separate blasting machines and operators 116 A-C to minimize downtime and maximize efficiency.
More recently, the introduction of a remote control blasting machine has further increased the safety and efficiency of blasting. A remote control blasting machine essentially separates a traditional blasting machine into two components, a remote device 182 and a controller device 184.
An additional safety and efficiency concern of remote control blasting machines is associated with deployment of the remote device 182. Information sent using radio frequencies is the typical method for communication between a controller device 184 and a remote device 182. Topographical features or atmospheric conditions can attenuate effective radio frequency communication range. This attenuation can result in ineffective placement of a remote device 182 or controller device 184 and create uncertainty in a blasting sequence, thereby reducing safety and efficiency. If weather changes or the movement of equipment at a mine disrupt communication, a shot may not fire, leaving an unexpected live explosive charge in the field where workers will be returning. This is a significant disadvantage associated with remote control blasting machines and is especially troublesome in subterranean mines 150 where electromagnetic attenuation is a more significant problem than in surface mining 100.
In accordance with this invention, a remote firing system, a controller device, a remote device, and a method for remotely detonating explosives is provided. The system form of the invention includes a remote firing system that comprises a set of remote devices. Each remote device is capable of communicating a safety data structure that contains a system identifier for identifying the remote firing system from other remote firing systems and a device identifier for identifying a remote device from other remote devices. The remote firing system further includes a controller device for causing the set of remote devices to trigger detonators. The controller device is capable of selecting a subset of the set of remote devices for triggering detonators and further being capable of communicating the safety data structure that contains a system identifier for identifying the remote firing system from other remote firing systems and device identifiers for identifying the subset of remote devices to control.
In accordance with further aspects of this invention, a device form of the invention includes a controller device that includes a set of selection and information panels that correspond with a set of remote devices. A subset of selection and information panels is selectable to cause a corresponding subset of remote devices to be selected for detonating explosives. The controller device further includes a communication module for transmitting and receiving safety communication. The communication module is capable of communicating with the subset of remote devices to indicate their selection for detonating explosives by the controller device.
In accordance with further aspects of this invention, a device form of the invention includes a remote device that includes a communication module for transmitting and receiving a safety data structure that contains a system identifier for identifying a remote firing system that comprises the remote device and a device identifier for identifying the remote device. The remote device further includes a switch for selecting either shock-tube detonator initiation or electric detonator initiation.
In accordance with further aspects of this invention, a method form of the invention includes a method for remotely detonating explosives. The method includes selecting a subset of a set of selection and information panels on a controller device to cause a corresponding subset of remote devices to be selected for detonating explosives. The method further includes issuing an arming command by the controller device to the subset of remote devices to cause the subset of remote devices to prepare for detonation. The method yet further includes issuing a firing command by the controller device to the subset of remote devices by simultaneously selecting dual fire switches together on the controller device to cause the subset of remote devices to detonate explosives.
The foregoing aspects and many of the attendant advantages of this invention will become more readily appreciated as the same become better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings, wherein:
As discussed hereinbefore, blasting machines have improved the safety and efficiency of detonating explosive charges in mining, construction, and military applications. Both typical lead-line blasting machines (tethered systems) and remote control blasting machines have provided significant increases in safety and efficiency over prior techniques. However, still greater increases in efficiency and safety can be achieved through various embodiments of the present invention.
The term safety communication used hereinabove and hereinbelow means any suitable communication occurring between a remote device and a controller device that indicates that interoperation is safe. One suitable safety communication occurs when a safety data structure is transmitted from a first piece of equipment and received at a second piece of equipment and transmitted from the second piece of equipment and received by the first piece of equipment. In one embodiment of the present invention a safety data structure containing blasting information can be transmitted from the controller device 202 and received by the remote device 208, and another safety data structure containing blasting information can be transmitted from the remote device 208 and received by the controller device 202. Blasting information contained within the safety data structure includes the battery condition of a device; armed or ready status of a device; error detection codes; system, device, index identification; and timing information among other pieces of information. These pieces of information, any of which could form part of a safety data structure, are not exhaustive or exclusive and additional suitable pieces of blasting information can be contained by the safety data structure.
The device identifier, coded on an electronic key, increases the safety of operating multiple remote devices through a single controller device. In one embodiment of the present invention, the controller device 226 or 228 is used preferably to operate one to eight remote devices, although less or more remote devices are possible. Preferably, remote devices are non-operational when a controller device electronic key is coupled to the remote devices. Further, the controller device operates preferably in a programming mode when a remote device electronic key is coupled to the controller device if the controller is in key programming mode. When a remote device is coupled to a compatible remote device electronic key or when a controller device is coupled to a compatible controller device electronic key, the devices preferably operate normally. As illustrated in
The remote firing system identifier serves to increase the safety of concurrent operation of multiple remote firing systems 220. Each remote firing system 222 and 224 is designated by a unique identifier such as A and B. (See electronic keys 230 and 232.) In one embodiment of the present invention, the system identifier includes the serial number of the controller device. Remote devices coupled to remote device electronic keys with suitable system identifiers and indexed identifiers (discussed below) function normally. Remote devices coupled to remote device electronic keys preferably discard a transmission received from a controller device on a different system with different system identifiers. In
The indexed identifier information stored on an electronic key represents the most recent programming event of the electronic key. Each time an electronic key is reprogrammed on a controller device, the identifier is indexed and updated on the electronic key and stored internally on the controller device. This prevents more than one remote firing system device electronic key from carrying identifier information that is identical (same device identifier, same system identifier, and same indexed identifier) as another electronic key. For example, if a first electronic key is programmed to 4:A:T1, an attempt to program a second electronic key with the same identifiers will result in the index identifier being incremented. The identification information that would be stored on the second electronic key is 4:A:T2. Any suitable incrementing process can be used, such as time stamping. The electronic key with the most recent indexed identifier preferably allows a remote device to function while the electronic key with the older indexed identifier will not allow the device to function, despite both keys otherwise identifying the same device and system identifiers.
Electronic keys with the same device identifier and indexed identifier are possible, but preferably exist on different systems, by design, maintaining the robust nature of the unique electronic key scheme. For example, if the first electronic key is 4:A:T2, a second key, with an identical device identifier and indexed identifier, 4 and T2, preferably be programmed on system B (more precisely, the system identifier can be programmed on any system other than system A) yielding 4:B:T2. If the second key were programmed with a device identifier 4 and a system identifier A, the indexed identifier would be incremented yielding 4:A:T3. Essentially, each electronic key contains a unique set of identifiers distinguishing a controller or remote device, a remote firing system, and the most recent set of programming. This creates an additional level of safety by creating unique electronic keys and preventing multiple, unintended detonations that could otherwise result if duplicate electronic keys were present in a remote firing system.
In one embodiment of the present invention, electronic key identification information is transmitted as a component of the safety data structure for a transmission by a piece of remote firing system equipment. A received safety data structure is parsed and the extracted identification information is compared to the information stored on an electronic key coupled to the receiving piece of equipment. For example, while each remote device 240, 242, and 244 in
The transmission from controller device 226, if received by the remote device 242, is preferably discarded by remote device 242 because the system identifier is not compatible. This same transmission from controller device 226, if received by the remote devices 240 and 244, is accepted because the system and indexed identifiers are compatible. The transmission from controller device 228 is preferably accepted by remote device 242, while preferably being discarded by remote devices 240 and 244. Transmissions from the remote devices 240, 242, and 244 will preferably be discarded by controller devices 226 and 228 with uncompatible system identifiers. To recap, unless the system and indexed identifiers on the electronic keys coupled to both a controller device and one or more remote devices are compatible, the controller and remote devices preferably discard a received transmission. Preferably remote devices discard transmissions that do not identify as originating from a controller device. This allows the operator to control, with a single controller device, multiple uniquely identified remote devices. Multiple remote firing systems can be deployed contemporaneously 220 because they are unlikely to conflict with one another due to different system identifiers.
In one embodiment of the present invention, the remote devices of the firing system can be semi-permanently assigned a device identity as an alternative to assuming the identity associated with the identification information stored on a coupled electronic key. This semi-permanent programming causes the remote device to function normally preferably with remote device electronic keys having a specified device identifier that suitably relates to the semi-permanently programmed device identifier stored internally on the remote device. Additional safety results from semi-permanent programming of remote devices for particular applications where the remote device is not frequently moved. As an example of semi-permanent programming, if electronic key 4:A:T2 is coupled to an unprogrammed remote device, the remote device will assume the identity 4:A:T2 and discard received transmissions that do not include compatible identifiers. The remote device preferably returns to a non-operational state when the electronic key is removed. If this same unprogrammed remote device is then semi-permanently programmed as system device number 6, the electronic key 4:A:T2 will not be recognized as valid when coupled to the remote device because the key has a system device identifier number 4 and not number 6. The semi-permanently programmed remote device will however preferably function normally (assuming a received transmission includes suitable identifiers) with any of the following electronic keys: 6:A:T1, 6:A:T5, 6:C:T1, 6:S:T9, for example. This is because they all have the same device identifier as the semi-permanently programmed system device identifier stored internally on the remote device. The number 6 identifier programmed is preferably nonvolatile and persists until the device is reset to an unprogrammed state or is semi-permanently programmed to a different device identity. In one embodiment of the present invention, semi-permanent system device identity programming is achieved preferably through the use of a master electronic key.
The right portion of the controller device user interface 300 includes a controller device interface, an informational interface, and a user input section interface. The controller device interface includes an external antenna connection port 316, an electronic key interface 318, and a programming port 320. The informational interface includes the controller device battery status panel 322, including labeling and an LED indicator for slow charge 324, fast charge 326, 20% remaining battery capacity 328, 40% remaining battery capacity 330, 60% remaining battery capacity 332, 80% remaining battery capacity 334, and 100% remaining battery capacity 336. These percentages of remaining battery capacity are arbitrarily selected and other percentages, or different styles of display, can be substituted in other embodiments without departing materially from the present invention.
The informational interface includes a panel 338 containing labeling and indicator LEDs for the device power 340, electronic key status 342, device transmitting 344, and device receiving 346.
The user input selection interface comprises a panel 348 for placing a controller device in the ON state, the panel 348 including labeling and a membrane switch 350. The user input selection interface further comprises a panel 352 for placing a controller device in the OFF state, the panel 352 including labeling and a membrane switch 354. The user input selection interface further comprises a panel 356 for selecting a status query operation with a membrane switch 360, the panel 356 including labeling and an LED indicator 358.
The user input selection interface further comprises a panel 362 for placing the controller device battery status panel 322 in an ON or OFF state by cycling a membrane switch 366, the panel 362 including labeling and an LED indicator 364. The user input selection interface further comprises a panel 368 for selecting an ARM command operation with a membrane switch 372, the panel 368 including labeling and an LED indicator 370. The user input selection interface further comprises a panel 374 for selecting a DISARM command operation with a membrane switch 378, the panel 374 including labeling and an LED indicator 376. The user input selection interface further comprises dual panels 380 and 386 for selecting a FIRE command operation with dual membrane switches 384 and 390, the panels 380 and 386 including labeling and LED indicators 382 and 388.
Combinations of the aforementioned LED indicators can be used to indicate device conditions. One example of this feature is flashing of all LED's when the device is placed in the ON state, indicating the initiation of a self-testing operation. Other suitable combinations are possible.
The remote device user interface 390 further includes a connection port 442 for connection of a lead line to the initiation circuitry. This port is located on the left sidewall of the remote device and comprises of two female banana plug connectors and two binding posts. Other suitable connectors or suitable locations for the connection port 442 can be used.
In one embodiment of the present invention, combinations of the aforementioned remote device user interface 390 LED indicators are used to indicate various device conditions. One example is the slow charge LED 422 being on and fast charge LED 424 being off to indicate a fully charged battery. Other combinations are possible.
Preferably, the electronic key module 502 serves as a coupling interface between the controller device 450 and the external electronic key 522. Information stored on the electronic key 522 is read into the controller device's internal memory (not shown) for processing by the controller device 450, or the controller device 450 can write information onto the electronic key 522 through the electronic key module 502.
Preferably, the programming port module 504 serves as a coupling interface between the controller device 450 and an external programming device (not shown), such as a digital computer, or the interlock device 524. The external programming device (not shown) may allow, for example, information stored in certain memory locations to be read out of the controller device 450; information to be written into certain memory locations on the controller device 450; or modification of internal controller device settings; among others. Many operations can be conducted through the programming port module 504. The programming port module 504 can be implemented using a 14-pin DIN type connector or other suitable connectors, designating various conductors for functionality such as battery charger contacts, external interlock device 524 input contacts, programming function contacts, and contacts for additional future functionality, among others.
Preferably, the self-test module 506 tests the internal circuitry and functionality of the controller device 450 for faults. The self-test module 506 indicates component failures by flashing indicator LEDs on the controller device user interface panel 300, as discussed previously. Other suitable methods of indicating self-test results can be used.
Preferably, the battery status module 508 displays the status and condition of a battery (not shown) in the controller device 450. The battery status module 508 may include a battery capacity display, such as a gas-gauge style digital display; battery condition indicators, such as the previously discussed flashing indicator LED's on the controller device user interface panel 300; and recharge rate indicator LEDs, among others. Other suitable displays and indicators can be used.
The timer module 512 can be implemented mechanically, with discrete electronics, with software, or by some combinations thereof. Preferably, the timer module 512 is used for controller device features requiring elapsed time information. For example, the timer module 512 is a software implemented, countdown timer triggering the execution of a DISARM command if the controller device 450 has transmitted an ARM command and has not transmitted a FIRE command within a specified time period.
Preferably, the communications module 520 serves to enable safety communication between the controller device 450 and other system devices through a transmission medium. Preferably, the communications module 520 includes a 5-watt maximum power radio transceiver for transmission and reception of radio frequency signals in the kHz to MHz range. Any suitable power or frequency range can be used for the transceiver without departing materially from the present invention. Further, other suitable methods of communication can be used.
Preferably, the controller device user interface module 510 includes all user input into the controller device 450 not included in the remote device selection module 514, controller device mode module 516, or controller device command module 518. This module includes functions such as turning a battery meter ON or OFF, among others.
Preferably, the remote device selection module 514 serves as an interface for the user allowing specific remote devices to be either selected or de-selected by the user. Preferably, multiple remote devices can be contemporaneously selected and operated from a single controller device.
Preferably, the controller device command module 518 serves as the user interface to selectively initiate command signals. The available commands may include ARM, FIRE, DISARM, and STATUS (querying the status of remote devices), among others. Other suitable commands can be used without materially departing from the present invention.
Preferably, the controller device mode module 516 serves as the user interface for selecting the operating mode of the controller device 450. The controller device mode module 516 may include NORMAL (signifying normal operation mode), PROGRAMMING (signifying programming mode), and QUERY (signifying safety communication query mode, such as the SAFETY POLL™ query facility offered by Rothenbuhler Engineering Co.), among others. The NORMAL mode is preferably the default mode and is used for detonating explosives. The PROGRAMMING mode preferably allows the controller device 450 to function as a programming device for programming electronic keys. Or other programmable options. The QUERY mode is preferably used to automatically test safety communication between the controller device 450 and selected remote devices (not shown.) Additional suitable modes, or suitable modification of the listed modes, can be included into the controller device mode module 516.
Preferably, the electronic key module 532 serves as a coupling interface between the remote device 452 and an electronic key 550. Further, information stored on the electronic key 550 can be read into the remote device's internal memory (not shown) for processing by the remote device 452 through the electronic key module 532.
Preferably, the programming port module 538 serves as a coupling interface between the remote device 452 and an external programming device (not shown), for example a digital computer. The external programming device may allow, for example, information stored in certain memory locations to be read out of the remote device 452; information to be written into certain memory locations on the remote device 452; or modification of internal remote device settings; among others. Many other suitable operations can be conducted through the programming port module 538. The programming port module 538 can be implemented using a 14-pin DIN type connector or other suitable connectors, designating various conductors for functionality such as battery charger contacts, programming function contacts, and contacts for additional future functionality, among others.
Preferably, the self-test module 536 tests the internal circuitry and functionality of the remote device 452 for faults. The self-test module 536 indicates component failures by flashing indicator LEDs on the remote device user interface panel 390, as previously discussed. Other suitable methods to indicate self-test results can be used.
Preferably, the battery status module 540 displays the status and condition of a battery (not shown) in the remote device 452. The battery status module 540 may include a battery capacity display, such as a digital display; battery condition indicators, such as the previously discusses flashing indicator LEDs on the remote device user interface 390; and recharging rate indicator LEDs, among others. Other suitable displays or indicators can be used.
The timer module 542 can be implemented mechanically, with discrete electronics, with software, or by some combination thereof. Preferably, the timer module 542 is used for remote device features requiring elapsed time information. For example, the timer module 542 is a software implemented, countdown timer triggering a DISARM command to disarm the remote device 452 if the remote device 452 has been ARMED and not FIRED within a specified time period. Preferably, the timer module 542 serves as a backup to the timed disarm sequence in the controller device 450 previously discussed.
Preferably, the communications module 544 serves to enable safety communication between the remote device 452 and other system devices via a transmission medium. Preferably, the communications module 544 includes a 1-watt maximum power radio transceiver for transmission and reception of radio frequency signals in the kHz to MHz range. Any suitable power or frequency range can be used for the transceiver without departing materially from the present invention. Further, other suitable methods of communication can be used.
Preferably, the remote device user interface module 534 includes all user input into the remote device 452 not included in the remote device operating mode module 548, or remote device output mode module 546. This module includes functions such as turning a battery meter ON by depressing a momentary switch, among others.
Preferably, the remote device output module 546 serves as an interface for the user allowing method selection for initiating a remote detonation (such as shock tube or electric detonators), among others.
Preferably, the remote device operating mode module 548 serves as the user interface to select the operating mode of the remote device 452. The remote device operating mode module 548 may include NORMAL (signifying normal operation mode), and PROGRAMMING (signifying programming mode), among others. The NORMAL mode is preferably the default mode and is used for detonating explosives. The PROGRAMMING mode preferably allows the remote device 452 to be programmed with a semi-permanently assigned device identifier. Additional suitable modes, or suitable modification of the listed modes, can be included in the remote device operating mode module 548.
FIGS. 5A-O illustrate a method for remotely detonating explosives. Generally, in deploying a remote control blasting machine for remotely detonating explosives, preparatory steps are undertaken to ensure the operability of the device prior to deploying it in the field. Once the device is deployed in the field and coupled to the explosives, several safety checks are undertaken. The device in the field is armed and then fired. Upon completion, a remote control blasting machine is generally returned to a safe environment for storage until the next use.
In
From Terminal A (
The processing steps between Terminals A and A1 can be accomplished either in parallel or serially. In parallel, all devices are contemporaneously powered ON, each then undergoes the self-test before each battery is checked for sufficient remaining charge, and system devices are then replaced or recharged, as needed. Serially, each device is powered ON, undergoes a self-test, the battery's remaining charge is checked, and the system device is replaced or recharged, as needed, before repeating the blocks for the next system device. Some blocks between Terminals A and A1 can readily be combined or further automated without departing from the present invention.
The processing steps described in
From terminal A2 (
From terminal A4 (
From terminal A5 (
From terminal A7 (
Summarizing the processing steps between block 654 and block 656, the controller device automatically and periodically transmits a status query signal as remote devices are deployed. If the remote devices are receiving the periodic status query, they are in safety communication range. If they do not receive the status query, they are either defective, in the wrong location, or their battery has become depleted. The remote devices ought to be replaced, repositioned, or recharged. If the remote devices are receiving status queries, safety communication is confirmed by verifying that the controller device is receiving a reply to the status query. If the controller device is not receiving the reply to status query, safety communication is not established and the system devices ought to be repositioned, replaced, or recharged. Once the devices are in safety communication, the polling mode is deactivated.
When the polling mode is not used to aid in the deployment of system devices at decision block 644 (
From terminal A8 (
From Terminal C (
From Terminal E (
From terminal E1 (
From terminal E2 (
From terminal G (
From terminal G1 (
The method 600 permits the selection of one or more remote devices, therefore not all deployed devices may have been selected for the preceding ARM and FIRE method steps. From terminal G2 (
While the preferred embodiment of the invention has been illustrated and described, it will be appreciated that various changes can be made therein without departing from the spirit and scope of the invention.
This application claims the benefit of U.S. Provisional Application No. 60/537,153, filed Jan. 16, 2004, which is expressly incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60537153 | Jan 2004 | US |