A method of communicating with a detonator assembly wherein an encryption key associated with the detonator assembly is stored in the detonator assembly and a message, intended for the detonator assembly, is encrypted at the control location using the encryption key whereupon the encrypted message i
A method of communicating with a detonator assembly wherein an encryption key associated with the detonator assembly is stored in the detonator assembly and a message, intended for the detonator assembly, is encrypted at the control location using the encryption key whereupon the encrypted message is transmitted to each of a plurality of detonator assemblies and each received message is decrypted and validated.
대표청구항▼
1. A method of communicating with at least one detonator assembly which is selected from a plurality of detonator assemblies, the method including the steps of: 1) providing a plurality of encryption keys, each encryption key being uniquely associated with a selected detonator assembly, or a selecte
1. A method of communicating with at least one detonator assembly which is selected from a plurality of detonator assemblies, the method including the steps of: 1) providing a plurality of encryption keys, each encryption key being uniquely associated with a selected detonator assembly, or a selected group of detonator assemblies, in the plurality of detonator assemblies;2) storing each encryption key in the selected detonator assembly, or in the selected group of detonator assemblies, with which the encryption key is uniquely associated;3) storing at least one of said encryption keys at a control location;4) at the control location encrypting a message, intended only for a selected detonator assembly, or for a selected group of detonator assemblies, using the respective encryption key which is uniquely associated with the selected detonator assembly or the selected group of detonator assemblies;5) transmitting the encrypted message to the plurality of detonator assemblies;6) receiving said encrypted message at each detonator assembly;7) at each detonator assembly undertaking a decryption process on the received message using the encryption key which is uniquely associated with the detonator assembly to produce a decrypted message;8) validating the decrypted message;9) only if the validation process is successful, further processing the decrypted message; and10) if the validation process is not successful, taking no further action in respect to the transmitted message. 2. A method according to claim 1 wherein the message encrypted at the control location includes a validation code which is appended to the message. 3. A method according to claim 2 wherein the message and the validation code are encrypted with the encryption key in step 4. 4. A method according to claim 3 wherein at each detonator assembly at which the decryption process is carried out a validation code is calculated from the decrypted message and this is compared to the validation code appended to the message and if the validation codes match the message is further processed. 5. A method according to claim 4 wherein steps 4 to 8, at least, are repeated to eliminate errors resulting from corrupted messages or from other sources. 6. A method according to claim 5 wherein, in step 5, the transmission is effected by modulating a magnetic signal. 7. A method according to claim 6 wherein, in step 3, a plurality of said encryption keys are stored at the control location. 8. A method according to claim 7 wherein, in step 1, a portable device is used to program the respective encryption key, which is associated with a given detonator assembly, into the detonator assembly before the assembly is placed into a respective blast hole. 9. A method according to claim 1 wherein at each detonator assembly at which the decryption process is carried out a validation code is calculated from the decrypted message and this is compared to the validation code appended to the message and if the validation codes match the message is further processed. 10. A method according to claim 9 wherein steps 4 to 8, at least, are repeated to eliminate errors resulting from corrupted messages or from other sources. 11. A method according to claim 10 wherein, in step 5, the transmission is effected by modulating a magnetic signal. 12. A method according to claim 11 wherein, in step 3, a plurality of said encryption keys are stored at the control location. 13. A method according to claim 12 wherein, in step 1, a portable device is used to program the respective encryption key, which is associated with a given detonator assembly, into the detonator assembly before the assembly is placed into a respective blast hole. 14. A method according to claim 2 wherein at each detonator assembly at which the decryption process is carried out a validation code is calculated from the decrypted message and this is compared to the validation code appended to the message and if the validation codes match the message is further processed. 15. A method according to claim 1 wherein steps 4 to 8, at least, are repeated to eliminate errors resulting from corrupted messages or from other sources. 16. A method according to claim 1 wherein, in step 5, the transmission is effected by modulating a magnetic signal. 17. A method according to claim 1 wherein, in step 3, a plurality of said encryption keys are stored at the control location. 18. A method according to claim 1 wherein, in step 1, a portable device is used to program the respective encryption key, which is associated with a given detonator assembly, into the detonator assembly before the assembly is placed into a respective blast hole.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (3)
Hummel, Dirk; Lownds, Charles Michael, Method of communication at a blast site, and corresponding blasting apparatus.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.