US20140183964A1 - Power Transmitting Device Having Power Theft Detection and Prevention - Google Patents
Power Transmitting Device Having Power Theft Detection and Prevention Download PDFInfo
- Publication number
- US20140183964A1 US20140183964A1 US13/857,457 US201313857457A US2014183964A1 US 20140183964 A1 US20140183964 A1 US 20140183964A1 US 201313857457 A US201313857457 A US 201313857457A US 2014183964 A1 US2014183964 A1 US 2014183964A1
- Authority
- US
- United States
- Prior art keywords
- power
- receiving device
- authentication
- amount
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000002265 prevention Effects 0.000 title claims abstract description 10
- 238000001514 detection method Methods 0.000 title claims description 13
- 238000000034 method Methods 0.000 claims abstract description 52
- 238000012546 transfer Methods 0.000 claims abstract description 37
- 238000012360 testing method Methods 0.000 claims abstract description 16
- 238000004891 communication Methods 0.000 claims description 33
- 230000005540 biological transmission Effects 0.000 claims description 11
- 238000013475 authorization Methods 0.000 claims description 2
- 229910000859 α-Fe Inorganic materials 0.000 description 13
- 230000006870 function Effects 0.000 description 11
- 230000000977 initiatory effect Effects 0.000 description 11
- 238000004590 computer program Methods 0.000 description 9
- 239000000463 material Substances 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000005259 measurement Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/70—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
- H04B5/79—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for data transfer in combination with power transfer
-
- H04B5/0037—
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J50/00—Circuit arrangements or systems for wireless supply or distribution of electric power
- H02J50/10—Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J50/00—Circuit arrangements or systems for wireless supply or distribution of electric power
- H02J50/60—Circuit arrangements or systems for wireless supply or distribution of electric power responsive to the presence of foreign objects, e.g. detection of living beings
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J50/00—Circuit arrangements or systems for wireless supply or distribution of electric power
- H02J50/80—Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/20—Near-field transmission systems, e.g. inductive or capacitive transmission systems characterised by the transmission technique; characterised by the transmission medium
- H04B5/24—Inductive coupling
Definitions
- the disclosure relates to a wireless charging station and wirelessly-chargeable receiver and specifically to the protection against power theft and foreign object detection in a wireless power transfer environment.
- Wireless power transfer stations such as power pads
- conventional wireless power transfer stations provide power indiscriminately to any capable device in its vicinity. Therefore, an unauthorized device can easily obtain power from conventional wireless power transfer stations.
- FIG. 1 illustrates an exemplary wireless power transfer environment
- FIG. 2 illustrates a block diagram of an exemplary wireless power transfer station
- FIG. 3 illustrates a block diagram of an exemplary power station that is capable of preventing power skimming
- FIG. 4 illustrates a plan view of an exemplary power station for using temperature sensing to detect foreign objects
- FIG. 5 illustrates a top-down plan view of an exemplary power station for detecting foreign objects
- FIG. 6 illustrates a block diagram of an exemplary method for transferring power from a power station to a chargeable receiving device
- FIG. 7 illustrates a block diagram of an exemplary general purpose computer system.
- Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors.
- a machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device).
- a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others.
- firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact results from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.
- module shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof.
- each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module.
- multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.
- FIG. 1 illustrates an exemplary wireless power transfer environment 100 .
- the environment 100 includes a wireless power transfer station (hereinafter “power station”) 110 .
- the power station 110 includes at least one coil 115 ( 115 ( 1 )- 115 ( 8 ) in the example of FIG. 1 ) arranged in a grid or matrix pattern.
- the coils send and receive signals between a wirelessly-chargeable device 150 .
- the exchanged signals can include data, commands and/or other communications, and can be used to transfer power from the power station 110 to the device 150 .
- the coils 115 of the power station 110 may be used as secondary coils to a primary coil 120 , discussed in detail below.
- the wireless power transfer is implemented as a magnetic coil-to-coil power transfer using a transmit coil and a receive coil.
- the transmit coil is excited with an AC current to produce an alternating magnetic field, that induces a secondary AC current in the receive coil.
- the secondary current can then be rectified using a diode bridge so as to produce a DC voltage that can be stored in a battery or used to power receiver circuits.
- FIG. 2 illustrates a block diagram of an exemplary wireless power transfer station 200 .
- the power station 200 includes a controller module 210 , a coil driving module 220 , a coil module 230 , and an authorization module 240 , and may represent an exemplary embodiment of the power station 110 .
- a controller module 210 may control the power station 200 to generate a wireless power transfer station.
- a coil driving module 220 may drive the power station 200 .
- a coil module 230 may represent an exemplary embodiment of the power station 110 .
- an authorization module 240 may represent an exemplary embodiment of the power station 110 .
- FIG. 2 illustrates a block diagram of an exemplary wireless power transfer station 200 .
- the power station 200 includes a controller module 210 , a coil driving module 220 , a coil module 230 , and an authorization module 240 , and may represent an exemplary embodiment of the power station 110 .
- FIGS. 3-5 can be similarly applied in a multi-standard system and may employ out-
- the coil module 230 may include one or more power transfer coils that are capable of being loaded with power transfer or other communication signals, and which are capable of receiving signals via load modulation or other communication standard.
- the coil driving module 220 drives one or more of the coils based on instructions received from the controller module 210 .
- the controller module 210 When the power station 200 detects the presence of a chargeable device in its vicinity, the controller module 210 begins an initiation phase of power transmission. During the initiation phase, the controller module 210 causes the coil driving module 220 to drive the coil module 230 to transmit a small amount of power to the receiving device. This small amount of power should be limited to an amount sufficient to allow the receiving device to negotiate with the power station 200 . Ideally, the initiation power would be impractical for charging purposes. In this manner, an unauthorized device could not charge from the initiation charge. Alternatively, the initiation power can be sufficient for charging purposes, but only supplied for a limited amount of time. This amount of time is preferably only slightly longer than an expected authentication period. At the end of the initiation period, if the receiving device has not been authenticated, the supply of wireless power to the receiving device can be halted.
- the power station 200 exchanges information and/or instructions with the receiving device in order to acquire authentication information from the receiving device.
- the authentication information includes identification and/or password or other access key information.
- the authentication information includes billing information, such as bank account, credit card, or other electronic funds transfer information.
- the authentication information can be received by the coil module 230 / 330 using in-band communication protocols, and/or from the communication module 360 using out-of-band communications.
- the coil module 230 forwards the received authentication information to an authentication module 240 .
- the authentication module 240 carries out an authentication procedure, using the received authentication information.
- the authentication process results in allowing or restricting access to the nearby receiving device based on whether the authentication process succeeded or failed.
- the authentication module 240 determines that the authentication process has succeeded, the authentication module 240 transmits an authentication success signal to the controller module 210 .
- the controller module 210 then instructs the coil driving module 220 to drive the one or more coils that correspond to the receiving device to transmit a charging power to the device.
- the charging power may be larger than the initiation power level and/or have a longer supply duration, and should be sufficient for the receiving device to charge its battery.
- the authentication module 240 determines that the authentication process has failed, the authentication module 240 transmits an authentication failed signal to the controller module 210 .
- the power station 200 can then institute one or more of several possible theft prevention methods.
- the coil driving module 220 can decommission power to the one or more coils 115 corresponding to the receiving device 150 . These coils can be identified by the coil driving module 220 based on loads and other signals of those coils 115 . Once identified, the coil driving module 220 can then stop the supply of power signals to those coils 115 .
- the coil module 220 can shift a transmission frequency and/or phase of the transmitted power signals.
- the power station 200 can privately set unique phase and/or frequencies for the power transmission signals.
- the authentication information can be obtained using a standard phase and/or frequency. Once authenticated, private phase and/or frequency information can be transmitted to the authenticated receiving devices. In this manner, each authenticated device will have a private power transmission channel on which to receive power from the power station 200 .
- the power station 200 can provide a frequency hopping code to be used in a frequency-hopping algorithm.
- the power station 200 and the receiving device can then transfer power over a frequency-hopping algorithm defined by the private code or other notifier.
- different frequency-hopping or other algorithms may be run on each to provide different power/power levels to different devices.
- the coil driving module 220 can cause the coils 115 of the coil module 230 to shift frequency and/or phase without informing the receiving device 150 as to the new transmission information. In this manner, the unauthorized receiving device 150 will be unable to receive the signals being transmitted from the coil module 230 .
- the controller module 210 when the controller module 210 receives the authentication failed signal from the authentication module 240 , the controller module 210 can instruct the coil driving module 220 to stop all power transmission. This halt may last for a predetermined time, until a new receiving device is detected, until the power station 200 detects the absence of the unauthorized receiving device, or until the occurrence of another trigger within the spirit and scope of the present disclosure.
- the coil driving module can simply continue transmitting at the low initiation power. As discussed above, this initiation power should be insufficient for practical charging purposes. Therefore, simply maintaining the initiation power may be a sufficient deterrent in some scenarios.
- the power station 200 includes a plurality of coils in its coil module 230 .
- the power station 200 can next determine a location of the unauthorized device. For example, by monitoring load impedance incident of the various coils of the coil module 230 , the power station 200 can determine a relatively accurate position of the unauthorized device with respect to the various coils. Once this position has been determined, the controller module 210 can cause the coil driving module 220 to drive two or more of the various coils at calculated frequencies to cause spatial anti-phase mixing at the location of the unauthorized device. By controlling the frequencies of these coils, the power station 200 is able to cancel the magnetic field at the location of the unauthorized device.
- alarms can be used to notify relevant persons or monitoring system of the unauthorized device. For example, upon determining that the device is unauthorized, the power station 200 may generate an audible or visual alarm to notify a user or station manager of the unauthorized charging attempt. Similarly, the alarm may be transmitted via network/cloud to a remote location or monitoring authority. For example, local security may be informed of the attempted breach in order to respond and remedy the unauthorized attempt.
- the receiving device may steal power from the power station.
- the amount of power loaded onto the coils of the power station if often different from the amount of power received by the receiving device. This differential can be explained by the efficiency of the system, which often is not perfect.
- the amount of money charged for the power transferred to the receiving device is a function of the amount of power actually received by the receiving device. Therefore, it may be necessary to communicate with the receiving device in order to obtain a report of the amount of power actually received. However, if the receiving device falsifies or erroneously generates this report (e.g., reports an amount received that is lower than actual), the receiving device is able to acquire more power than that for which the user of the receiving device actually pays (“power skimming”).
- FIG. 3 illustrates an exemplary power station 300 that is capable of preventing power skimming.
- the power station 300 includes a power measurement module 350 and a communication module 360 , and may represent an exemplary embodiment of the power station 110 .
- the power being transmitted from the coil module 230 is measured by a power measurement module 350 .
- the power measurement module 350 forwards the measured amount of power to the authentication module 340 for analysis.
- the authentication module 340 can be programmed with a transfer function.
- the transfer function is a function for estimating an amount of power that should be received by the receiving device based on the amount of power loaded onto the coil module 230 . Therefore, using the received measured power value from the power measurement module 350 , the authentication module 340 can estimate the amount of power being received by the receiving device.
- the controller module 210 can control one or more of the coil module 230 and the communication module 360 to acquire a received power report from the receiving device.
- the power station 300 can receive the received power report via load modulation of one or more of the coils within the coil module 230 or via any available wired or wireless communication method via the communication module 360 , including NFC, Bluetooth, Wi-Fi, etc.
- the authentication module 340 compares the amount of power reported by the receiving device to the estimated amount of power. Based on the comparison, the authentication module 340 then makes a determination as to whether the device remains authenticated for receiving power.
- the authentication module 340 determines that the receiving device is still authenticated, and takes no further action. If the reported amount of power is less than the estimate, the authentication module 340 compares the reported amount of a threshold value.
- the threshold value may be set as a percentage of the estimated value, for example. If the reported amount is above the threshold value, the authentication module 340 assumes the report is accurate and allows for the power transfer to continue.
- the authentication module 340 assumes that the report is false or at least erroneous and notifies the controller module 210 that the receiving device is no longer authenticated for power transfer. Consequently, the controller module 210 controls the coil driving module 220 to halt or reduce power transfer to the receiving device. In this manner, the power station 300 is able to prevent power skimming by the receiving device.
- Power skimming can also be prevented at the outset of power transfer.
- the power station 300 can perform a power reporting authentication routine.
- the coil driving module 220 can drive the coil module 230 with several different power levels at different time intervals, and the communication module 360 can obtain received power reports from the receiving device after each interval. This allows the authentication module 340 to compare data for multiple different power levels in order to increase comparison accuracies, or to determine at the outset as to whether the receiving device is accurately reporting received power.
- the power station 300 can also instruct the receiving device via the communication module 360 and/or coil module 230 to employ different load for one or more of the transmitted test power signals.
- This change in load can be detected by the coil module 230 of the power station 300 in order to determine if the receiving device is complying with instructions.
- load data provides the authentication module 340 with an additional layer of data for use in its accuracy determinations. Using one or more of these procedures can even further improve protection against power skimming.
- Power skimming can also be prevented that would otherwise occur towards the end of power exchange.
- a device may be authenticated and billed for a predetermined amount of power/time.
- the receiving device may seek to extend its charging beyond those valued. Therefore, in an embodiment, reauthorization can be required after predetermined intervals or intervals set by earlier payment in order to prevent post-skimming of power.
- Foreign objects in the vicinity of the power station can absorb power transmitted to the environment. This can greatly reduce efficiency of power transfer. In addition, foreign objects may heat up from the absorbed energy, which can be a safety hazard. Therefore, power stations should implement some form of foreign object detection in order to improve safety and to improve efficiency and authentication of power transfers.
- a power transmitter detects foreign objects by estimating an amount of power consumed by foreign objects, and comparing that amount to a threshold. Although this method may be effective for identifying foreign objects in some instances, the accuracy of the method is low, and therefore many foreign objects are often overlooked.
- one option is increase the frequency at which the power signals are transmitted.
- the coil driving module 220 can drive the coil module 230 at a high frequency. Eddy currents decrease at higher frequencies. Therefore, by increasing the transmission frequency of the power signals, the power station 300 can naturally reduce the effects of foreign objects.
- the power station can utilize the receiving device to assist in the foreign object detection. For example, for a receiving device that has been authenticated, the power station can request received power statistics from the receiving device. Based on the known amount of power transmitted, and the reported amount of power received by the receiving device, the power station 300 can determine if foreign objects are present. For example, if the reported amount of received power is significantly lower than the amount of transmitted power, this would suggest that a foreign object is absorbing some of the transferred power.
- the power station can detect foreign objects using sideband sensing.
- sideband sensing may include infrared sensing or temperature sensing to detect hot areas of the power station, which may be indicative of a foreign object.
- infrared when used, the measured heat data will be compared to some baseline value in order to determine whether there are any hot spots on the power station.
- FIG. 4 illustrates a plan view of an exemplary power station 400 for using temperature sensing to detect foreign objects.
- the power station 400 includes a plurality of coils 420 disposed on a ferrite material plate 410 .
- a plurality of temperature sensors are attached to the ferrite material 410 .
- the temperature sensors 430 detect the temperature of the ferrite plate 410 at these localized areas to determine whether a foreign object is present.
- the temperature sensors 430 are disposed on a housing 440 that encases the ferrite plate 410 . In this configuration, the temperature sensors 430 detect the internal temperature of the power station 400 rather than the direct temperature of the ferrite material 410 .
- FIG. 5 illustrates a top-down plan view of an exemplary power station 500 for detecting foreign objects.
- the power station 500 includes a ferrite plate 505 and a plurality of temperature sensors 530 .
- the power station 500 further includes a primary coil 510 and a plurality of secondary coils 520 , and may represent an exemplary embodiment of the power station 110 .
- the power station 500 demonstrates multiple foreign object detection configurations that may or may not be used together.
- the ferrite plate 505 is broken into multiple sections 505 A- 505 D.
- a temperature sensor 530 A- 530 D is provided to each of these sections, respectively, for detecting localized temperature changes in the ferrite material.
- the temperature of the ferrite sections 505 A- 505 D can be determined by measuring the resistance changes of each of the those section. As the ferrite material 505 heats up, its resistance will change. By measuring a current passed through each corresponding ferrite material section 505 A- 505 D, temperature changes of those sections can be determined.
- the coils 520 / 510 can be used to determine whether foreign objects are in the vicinity.
- the coils cover a large surface area of the power station 500 .
- the coils 510 / 520 are metallic and can be constructed with materials that are good heat conductors. Similar to the ferrite material, when the metal of the coils 510 / 520 heats up, their resistances will change. By passing a known current through the coils 510 / 520 and measuring the voltage change, heat changes can be detected.
- the foreign object detection can be performed without interrupting power transfer to another device.
- the primary coil 510 can be used to transmit power signals to a receiving device while the power station 500 measures voltage changes in each of the secondary coils 520 .
- the power station 500 can transmit power to a receiving device via one or more of the secondary coils 520 , while measuring voltage changes among the remaining secondary coils 520 .
- the power station 500 can temporarily energize the secondary coils to perform foreign object detection. Once the foreign object detection procedure has completed, the power station 500 can de-energize those same coils in order to save power. Further, in order to avoid interfering with the coils being used to charge the receiving device, the unused coils can be energized at a different frequency from the charging coils.
- Additional configurations may be available to detect the presence of foreign objects, such as for example video/still camera detection, laser scanning and pressure sensing, among others within the spirit and scope of the present disclosure. Using any of the above foreign object detection methods will allow for efficient power transfer and accurate authentication with a receiving device.
- the power station 500 is capable of detecting and distinguishing between a foreign object and an unauthorized device. In doing so, the power station 500 measures power and/or impedances across multiple of its coils 520 and/or at multiple frequencies. By analyzing the results of these measurements, the power station 500 can characterize the object as an unauthorized device or foreign object. The power station 500 can then take different actions depending on its determination. For example, if the power station 500 determines that a foreign object is present, the power station 500 can stop any or nearby charging operations as a safety precaution. Alternatively, if the power station 500 determines that an unauthorized phone is present, the power station 500 may implement any of the power control methods described above.
- FIG. 6 illustrates a block diagram of an exemplary method for transferring power from a power station to a chargeable receiving device.
- the power station receives authentication information from the receiving device ( 610 ). This information can be received via load modulation over the WPT standard, or using any other available communication standard, including NFC, WiFi, Bluetooth, etc. Based on the received authentication information, the power station determines whether the receiving device is authenticated for power transfer ( 620 ).
- the power station determines that the receiving device is not authenticated ( 620 —N)
- the power station initiates a power theft prevention measure ( 630 ).
- This measure may include decommissioning power to coils corresponding to the receiving device, shifting frequencies of those coils, or shutting down the transmission, among others.
- the power station determines that the receiving device is authenticated ( 620 —Y)
- the power station transmits a report request as well as test power signals ( 640 ).
- the test power signals may be chosen at different power level, different frequencies, and for different loads.
- the power station receives a received power report from the receiving device ( 650 ) that reports the amount of power actually received for the different test power signals.
- the power station determines whether the receiving device is authenticated ( 660 ). This second authentication may be performed by comparing the reported power levels to expected/estimated power levels. If the reported levels are too low compared to the estimated levels, then the power station determines that the receiving device failed the power report authentication ( 660 —N). When this occurs, the power station implements one or more of the power theft prevention measures detailed above ( 630 ).
- the power station determines that the reported power values are sufficient close to the estimated values, then the power station authenticates the receiving device ( 660 —Y). Once the receiving device has successfully passed the second authentication ( 660 —Y), the power station begins transmitting power ( 670 ).
- the power station can periodically request an updated received power report from the receiving device ( 640 ) in order to verify that proper tracking is being performed. When this occurs, the power station proceeds back through steps 650 and 660 before returning to power transmission ( 670 ).
- the above method can additionally or alternatively include any of the functionality of the power station 110 discussed above, as well as any of its modifications. Further, the above description of the exemplary method should neither be construed to limit the method nor the description of the mobile device power station 110 .
- Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system.
- An example of such a computer system 700 is shown in FIG. 7 .
- One or more of the modules depicted in the previous figures can be at least partially implemented on one or more distinct computer systems 700 .
- Computer system 700 includes one or more processors, such as processor 704 .
- Processor 704 can be a special purpose or a general purpose digital signal processor.
- Processor 704 is connected to a communication infrastructure 702 (for example, a bus or network).
- a communication infrastructure 702 for example, a bus or network.
- Computer system 700 also includes a main memory 706 , preferably random access memory (RAM), and may also include a secondary memory 708 .
- Secondary memory 708 may include, for example, a hard disk drive 710 and/or a removable storage drive 712 , representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like.
- Removable storage drive 712 reads from and/or writes to a removable storage unit 716 in a well-known manner.
- Removable storage unit 716 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to by removable storage drive 712 .
- removable storage unit 716 includes a computer usable storage medium having stored therein computer software and/or data.
- secondary memory 708 may include other similar means for allowing computer programs or other instructions to be loaded into computer system 700 .
- Such means may include, for example, a removable storage unit 718 and an interface 714 .
- Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and other removable storage units 718 and interfaces 714 which allow software and data to be transferred from removable storage unit 718 to computer system 700 .
- Computer system 700 may also include a communications interface 720 .
- Communications interface 720 allows software and data to be transferred between computer system 700 and external devices. Examples of communications interface 720 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc.
- Software and data transferred via communications interface 720 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 720 . These signals are provided to communications interface 720 via a communications path 722 .
- Communications path 722 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels.
- computer program medium and “computer readable medium” are used to generally refer to tangible storage media such as removable storage units 716 and 718 or a hard disk installed in hard disk drive 710 . These computer program products are means for providing software to computer system 700 .
- Computer programs are stored in main memory 706 and/or secondary memory 708 . Computer programs may also be received via communications interface 720 . Such computer programs, when executed, enable the computer system 700 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enable processor 704 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of the computer system 700 . Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded into computer system 700 using removable storage drive 712 , interface 714 , or communications interface 720 .
- features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays.
- ASICs application-specific integrated circuits
- gate arrays gate arrays
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Power Engineering (AREA)
- Signal Processing (AREA)
- Charge And Discharge Circuits For Batteries Or The Like (AREA)
Abstract
Description
- This application claims the benefit of U.S. Provisional Patent Application No. 61/747,061, filed on Dec. 28, 2012, which is incorporated by reference herein in its entirety.
- 1. Field of Invention
- The disclosure relates to a wireless charging station and wirelessly-chargeable receiver and specifically to the protection against power theft and foreign object detection in a wireless power transfer environment.
- 2. Related Art
- Wireless power transfer stations, such as power pads, have recently become known. However, conventional wireless power transfer stations provide power indiscriminately to any capable device in its vicinity. Therefore, an unauthorized device can easily obtain power from conventional wireless power transfer stations.
- Embodiments are described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left most digit(s) of a reference number identifies the drawing in which the reference number first appears.
-
FIG. 1 illustrates an exemplary wireless power transfer environment; -
FIG. 2 illustrates a block diagram of an exemplary wireless power transfer station; -
FIG. 3 illustrates a block diagram of an exemplary power station that is capable of preventing power skimming; -
FIG. 4 illustrates a plan view of an exemplary power station for using temperature sensing to detect foreign objects; -
FIG. 5 illustrates a top-down plan view of an exemplary power station for detecting foreign objects; -
FIG. 6 illustrates a block diagram of an exemplary method for transferring power from a power station to a chargeable receiving device; and -
FIG. 7 illustrates a block diagram of an exemplary general purpose computer system. - The following Detailed Description refers to accompanying drawings to illustrate exemplary embodiments consistent with the disclosure. References in the Detailed Description to “one exemplary embodiment,” “an exemplary embodiment,” “an example exemplary embodiment,” etc., indicate that the exemplary embodiment described may include a particular feature, structure, or characteristic, but every exemplary embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same exemplary embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an exemplary embodiment, it is within the knowledge of those skilled in the relevant art(s) to affect such feature, structure, or characteristic in connection with other exemplary embodiments whether or not explicitly described.
- The exemplary embodiments described herein are provided for illustrative purposes, and are not limiting. Other exemplary embodiments are possible, and modifications may be made to the exemplary embodiments within the spirit and scope of the disclosure. Therefore, the Detailed Description is not meant to limit the invention. Rather, the scope of the invention is defined only in accordance with the following claims and their equivalents.
- Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors. A machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device). For example, a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others. Further, firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact results from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.
- For purposes of this discussion, the term “module” shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof. In addition, it will be understood that each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module. Conversely, multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.
- The following Detailed Description of the exemplary embodiments will so fully reveal the general nature of the invention that others can, by applying knowledge of those skilled in relevant art(s), readily modify and/or adapt for various applications such exemplary embodiments, without undue experimentation, without departing from the spirit and scope of the disclosure. Therefore, such adaptations and modifications are intended to be within the meaning and plurality of equivalents of the exemplary embodiments based upon the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by those skilled in relevant art(s) in light of the teachings herein.
- Those skilled in the relevant art(s) will recognize that this description may be applicable to many various charging and/or communication methods without departing from the spirit and scope of the present disclosure.
- An Exemplary Wireless Power Transfer Environment
-
FIG. 1 illustrates an exemplary wirelesspower transfer environment 100. Theenvironment 100 includes a wireless power transfer station (hereinafter “power station”) 110. Thepower station 110 includes at least one coil 115 (115(1)-115(8) in the example ofFIG. 1 ) arranged in a grid or matrix pattern. The coils send and receive signals between a wirelessly-chargeable device 150. The exchanged signals can include data, commands and/or other communications, and can be used to transfer power from thepower station 110 to thedevice 150. In an embodiment, thecoils 115 of thepower station 110 may be used as secondary coils to aprimary coil 120, discussed in detail below. - When a user of the
device 150 seeks to wirelessly charge a battery or other power storage device within thedevice 150, the user moves thedevice 150 to be within a proximity of thepower station 110. After an initialization and setup period, thepower station 110 loads power transfer signals onto one or more of itscoils 115 and transmits those signals to thedevice 150. The device receives the signals from thecoils 115 of thepower station 110 and extracts power therefrom. In this manner, thepower station 110 functions as a power transmitter and thedevice 150 functions as a power receiver. In embodiments, the wireless power transfer is implemented as a magnetic coil-to-coil power transfer using a transmit coil and a receive coil. The transmit coil is excited with an AC current to produce an alternating magnetic field, that induces a secondary AC current in the receive coil. The secondary current can then be rectified using a diode bridge so as to produce a DC voltage that can be stored in a battery or used to power receiver circuits. - Exemplary Wireless Power Transfer Device and Functionality
-
FIG. 2 illustrates a block diagram of an exemplary wirelesspower transfer station 200. Thepower station 200 includes acontroller module 210, acoil driving module 220, acoil module 230, and anauthorization module 240, and may represent an exemplary embodiment of thepower station 110. It should be understood that the following descriptions of the structure, functions, and capabilities of thepower station 200 described inFIG. 2 , as well as with respect to the additional devices illustrated inFIGS. 3-5 can be similarly applied in a multi-standard system and may employ out-of-band communications for carrying out communications operations. - The
coil module 230 may include one or more power transfer coils that are capable of being loaded with power transfer or other communication signals, and which are capable of receiving signals via load modulation or other communication standard. Thecoil driving module 220 drives one or more of the coils based on instructions received from thecontroller module 210. - When the
power station 200 detects the presence of a chargeable device in its vicinity, thecontroller module 210 begins an initiation phase of power transmission. During the initiation phase, thecontroller module 210 causes thecoil driving module 220 to drive thecoil module 230 to transmit a small amount of power to the receiving device. This small amount of power should be limited to an amount sufficient to allow the receiving device to negotiate with thepower station 200. Ideally, the initiation power would be impractical for charging purposes. In this manner, an unauthorized device could not charge from the initiation charge. Alternatively, the initiation power can be sufficient for charging purposes, but only supplied for a limited amount of time. This amount of time is preferably only slightly longer than an expected authentication period. At the end of the initiation period, if the receiving device has not been authenticated, the supply of wireless power to the receiving device can be halted. - During the initiation phase, the
power station 200 exchanges information and/or instructions with the receiving device in order to acquire authentication information from the receiving device. In an embodiment, the authentication information includes identification and/or password or other access key information. In an embodiment, the authentication information includes billing information, such as bank account, credit card, or other electronic funds transfer information. As shown, for example, inFIGS. 2 and 3 , the authentication information can be received by thecoil module 230/330 using in-band communication protocols, and/or from thecommunication module 360 using out-of-band communications. - The
coil module 230 forwards the received authentication information to anauthentication module 240. Theauthentication module 240 carries out an authentication procedure, using the received authentication information. The authentication process results in allowing or restricting access to the nearby receiving device based on whether the authentication process succeeded or failed. - Allowing and Restricting Access to Power
- If the
authentication module 240 determines that the authentication process has succeeded, theauthentication module 240 transmits an authentication success signal to thecontroller module 210. Thecontroller module 210 then instructs thecoil driving module 220 to drive the one or more coils that correspond to the receiving device to transmit a charging power to the device. The charging power may be larger than the initiation power level and/or have a longer supply duration, and should be sufficient for the receiving device to charge its battery. - If, on the other hand, the
authentication module 240 determines that the authentication process has failed, theauthentication module 240 transmits an authentication failed signal to thecontroller module 210. Thepower station 200 can then institute one or more of several possible theft prevention methods. - In an embodiment, upon a failed identification, the
coil driving module 220 can decommission power to the one ormore coils 115 corresponding to the receivingdevice 150. These coils can be identified by thecoil driving module 220 based on loads and other signals of thosecoils 115. Once identified, thecoil driving module 220 can then stop the supply of power signals to thosecoils 115. - In an embodiment, the
coil module 220 can shift a transmission frequency and/or phase of the transmitted power signals. For example, in an environment where thepower station 200 is capable of charging multiple devices at a given time, thepower station 200 can privately set unique phase and/or frequencies for the power transmission signals. The authentication information can be obtained using a standard phase and/or frequency. Once authenticated, private phase and/or frequency information can be transmitted to the authenticated receiving devices. In this manner, each authenticated device will have a private power transmission channel on which to receive power from thepower station 200. - Similarly, rather than transmitting a private single frequency to be used in communication, the
power station 200 can provide a frequency hopping code to be used in a frequency-hopping algorithm. Thepower station 200 and the receiving device can then transfer power over a frequency-hopping algorithm defined by the private code or other notifier. With different coils, different frequency-hopping or other algorithms may be run on each to provide different power/power levels to different devices. - When a device fails the authentication process, the
coil driving module 220 can cause thecoils 115 of thecoil module 230 to shift frequency and/or phase without informing the receivingdevice 150 as to the new transmission information. In this manner, theunauthorized receiving device 150 will be unable to receive the signals being transmitted from thecoil module 230. - In an embodiment, when the
controller module 210 receives the authentication failed signal from theauthentication module 240, thecontroller module 210 can instruct thecoil driving module 220 to stop all power transmission. This halt may last for a predetermined time, until a new receiving device is detected, until thepower station 200 detects the absence of the unauthorized receiving device, or until the occurrence of another trigger within the spirit and scope of the present disclosure. - In an embodiment, the coil driving module can simply continue transmitting at the low initiation power. As discussed above, this initiation power should be insufficient for practical charging purposes. Therefore, simply maintaining the initiation power may be a sufficient deterrent in some scenarios.
- In another embodiment, the
power station 200 includes a plurality of coils in itscoil module 230. Upon detecting the presence of an unauthorized device, thepower station 200 can next determine a location of the unauthorized device. For example, by monitoring load impedance incident of the various coils of thecoil module 230, thepower station 200 can determine a relatively accurate position of the unauthorized device with respect to the various coils. Once this position has been determined, thecontroller module 210 can cause thecoil driving module 220 to drive two or more of the various coils at calculated frequencies to cause spatial anti-phase mixing at the location of the unauthorized device. By controlling the frequencies of these coils, thepower station 200 is able to cancel the magnetic field at the location of the unauthorized device. - Alternatively, or in addition, to any of the above power theft prevention techniques, alarms can be used to notify relevant persons or monitoring system of the unauthorized device. For example, upon determining that the device is unauthorized, the
power station 200 may generate an audible or visual alarm to notify a user or station manager of the unauthorized charging attempt. Similarly, the alarm may be transmitted via network/cloud to a remote location or monitoring authority. For example, local security may be informed of the attempted breach in order to respond and remedy the unauthorized attempt. - Preventing Power Skimming
- After a device has been authenticated and given access to receiving power, there may be other ways for the receiving device to steal power from the power station. For example, in wireless transfer protocols, the amount of power loaded onto the coils of the power station if often different from the amount of power received by the receiving device. This differential can be explained by the efficiency of the system, which often is not perfect.
- In an embodiment, the amount of money charged for the power transferred to the receiving device is a function of the amount of power actually received by the receiving device. Therefore, it may be necessary to communicate with the receiving device in order to obtain a report of the amount of power actually received. However, if the receiving device falsifies or erroneously generates this report (e.g., reports an amount received that is lower than actual), the receiving device is able to acquire more power than that for which the user of the receiving device actually pays (“power skimming”).
-
FIG. 3 illustrates anexemplary power station 300 that is capable of preventing power skimming. Thepower station 300 includes apower measurement module 350 and acommunication module 360, and may represent an exemplary embodiment of thepower station 110. - In the
power station 300, the power being transmitted from thecoil module 230 is measured by apower measurement module 350. Thepower measurement module 350 forwards the measured amount of power to theauthentication module 340 for analysis. - The
authentication module 340 can be programmed with a transfer function. The transfer function is a function for estimating an amount of power that should be received by the receiving device based on the amount of power loaded onto thecoil module 230. Therefore, using the received measured power value from thepower measurement module 350, theauthentication module 340 can estimate the amount of power being received by the receiving device. - In addition, the
controller module 210 can control one or more of thecoil module 230 and thecommunication module 360 to acquire a received power report from the receiving device. For example, thepower station 300 can receive the received power report via load modulation of one or more of the coils within thecoil module 230 or via any available wired or wireless communication method via thecommunication module 360, including NFC, Bluetooth, Wi-Fi, etc. - Once the
authentication module 340 obtains the received power report from the receiving device, theauthentication module 340 compares the amount of power reported by the receiving device to the estimated amount of power. Based on the comparison, theauthentication module 340 then makes a determination as to whether the device remains authenticated for receiving power. - For example, if the amount of power reported by the receiving device is greater than the estimated amount of power, the
authentication module 340 determines that the receiving device is still authenticated, and takes no further action. If the reported amount of power is less than the estimate, theauthentication module 340 compares the reported amount of a threshold value. The threshold value may be set as a percentage of the estimated value, for example. If the reported amount is above the threshold value, theauthentication module 340 assumes the report is accurate and allows for the power transfer to continue. - If, on the other hand, the reported value is less than the threshold value, the
authentication module 340 assumes that the report is false or at least erroneous and notifies thecontroller module 210 that the receiving device is no longer authenticated for power transfer. Consequently, thecontroller module 210 controls thecoil driving module 220 to halt or reduce power transfer to the receiving device. In this manner, thepower station 300 is able to prevent power skimming by the receiving device. - Power skimming can also be prevented at the outset of power transfer. For example, during the initial authentication process between the
power station 300 and the receivingdevice 150, thepower station 300 can perform a power reporting authentication routine. As a part of this routine, thecoil driving module 220 can drive thecoil module 230 with several different power levels at different time intervals, and thecommunication module 360 can obtain received power reports from the receiving device after each interval. This allows theauthentication module 340 to compare data for multiple different power levels in order to increase comparison accuracies, or to determine at the outset as to whether the receiving device is accurately reporting received power. - In addition to transmitting at different power levels, the
power station 300 can also instruct the receiving device via thecommunication module 360 and/orcoil module 230 to employ different load for one or more of the transmitted test power signals. This change in load can be detected by thecoil module 230 of thepower station 300 in order to determine if the receiving device is complying with instructions. In addition, load data provides theauthentication module 340 with an additional layer of data for use in its accuracy determinations. Using one or more of these procedures can even further improve protection against power skimming. - Power skimming can also be prevented that would otherwise occur towards the end of power exchange. For example, in an embodiment, a device may be authenticated and billed for a predetermined amount of power/time. However, the receiving device may seek to extend its charging beyond those valued. Therefore, in an embodiment, reauthorization can be required after predetermined intervals or intervals set by earlier payment in order to prevent post-skimming of power.
- Foreign Object Detection
- Foreign objects in the vicinity of the power station can absorb power transmitted to the environment. This can greatly reduce efficiency of power transfer. In addition, foreign objects may heat up from the absorbed energy, which can be a safety hazard. Therefore, power stations should implement some form of foreign object detection in order to improve safety and to improve efficiency and authentication of power transfers.
- Conventionally, a power transmitter detects foreign objects by estimating an amount of power consumed by foreign objects, and comparing that amount to a threshold. Although this method may be effective for identifying foreign objects in some instances, the accuracy of the method is low, and therefore many foreign objects are often overlooked.
- In an embodiment, one option is increase the frequency at which the power signals are transmitted. For example, the
coil driving module 220 can drive thecoil module 230 at a high frequency. Eddy currents decrease at higher frequencies. Therefore, by increasing the transmission frequency of the power signals, thepower station 300 can naturally reduce the effects of foreign objects. - In an embodiment, the power station can utilize the receiving device to assist in the foreign object detection. For example, for a receiving device that has been authenticated, the power station can request received power statistics from the receiving device. Based on the known amount of power transmitted, and the reported amount of power received by the receiving device, the
power station 300 can determine if foreign objects are present. For example, if the reported amount of received power is significantly lower than the amount of transmitted power, this would suggest that a foreign object is absorbing some of the transferred power. - In an embodiment, the power station can detect foreign objects using sideband sensing. For example, such sideband sensing may include infrared sensing or temperature sensing to detect hot areas of the power station, which may be indicative of a foreign object. When infrared is used, the measured heat data will be compared to some baseline value in order to determine whether there are any hot spots on the power station.
-
FIG. 4 illustrates a plan view of anexemplary power station 400 for using temperature sensing to detect foreign objects. Thepower station 400 includes a plurality ofcoils 420 disposed on aferrite material plate 410. A plurality of temperature sensors are attached to theferrite material 410. - As the foreign objects absorb transmitted power, they will heat up, causing a temperature of the
ferrite plate 410 to heat up in localized areas. Thetemperature sensors 430 detect the temperature of theferrite plate 410 at these localized areas to determine whether a foreign object is present. In an embodiment, thetemperature sensors 430 are disposed on ahousing 440 that encases theferrite plate 410. In this configuration, thetemperature sensors 430 detect the internal temperature of thepower station 400 rather than the direct temperature of theferrite material 410. -
FIG. 5 illustrates a top-down plan view of anexemplary power station 500 for detecting foreign objects. Thepower station 500 includes a ferrite plate 505 and a plurality of temperature sensors 530. Thepower station 500 further includes aprimary coil 510 and a plurality ofsecondary coils 520, and may represent an exemplary embodiment of thepower station 110. - The
power station 500 demonstrates multiple foreign object detection configurations that may or may not be used together. In an embodiment, the ferrite plate 505 is broken intomultiple sections 505A-505D. Atemperature sensor 530A-530D is provided to each of these sections, respectively, for detecting localized temperature changes in the ferrite material. - In another embodiment, the temperature of the
ferrite sections 505A-505D can be determined by measuring the resistance changes of each of the those section. As the ferrite material 505 heats up, its resistance will change. By measuring a current passed through each correspondingferrite material section 505A-505D, temperature changes of those sections can be determined. - In an embodiment, the
coils 520/510 can be used to determine whether foreign objects are in the vicinity. The coils cover a large surface area of thepower station 500. Further, thecoils 510/520 are metallic and can be constructed with materials that are good heat conductors. Similar to the ferrite material, when the metal of thecoils 510/520 heats up, their resistances will change. By passing a known current through thecoils 510/520 and measuring the voltage change, heat changes can be detected. - The foreign object detection can be performed without interrupting power transfer to another device. For example, the
primary coil 510 can be used to transmit power signals to a receiving device while thepower station 500 measures voltage changes in each of thesecondary coils 520. Alternatively, thepower station 500 can transmit power to a receiving device via one or more of thesecondary coils 520, while measuring voltage changes among the remainingsecondary coils 520. - The
power station 500 can temporarily energize the secondary coils to perform foreign object detection. Once the foreign object detection procedure has completed, thepower station 500 can de-energize those same coils in order to save power. Further, in order to avoid interfering with the coils being used to charge the receiving device, the unused coils can be energized at a different frequency from the charging coils. - Additional configurations may be available to detect the presence of foreign objects, such as for example video/still camera detection, laser scanning and pressure sensing, among others within the spirit and scope of the present disclosure. Using any of the above foreign object detection methods will allow for efficient power transfer and accurate authentication with a receiving device.
- In an embodiment, the
power station 500 is capable of detecting and distinguishing between a foreign object and an unauthorized device. In doing so, thepower station 500 measures power and/or impedances across multiple of itscoils 520 and/or at multiple frequencies. By analyzing the results of these measurements, thepower station 500 can characterize the object as an unauthorized device or foreign object. Thepower station 500 can then take different actions depending on its determination. For example, if thepower station 500 determines that a foreign object is present, thepower station 500 can stop any or nearby charging operations as a safety precaution. Alternatively, if thepower station 500 determines that an unauthorized phone is present, thepower station 500 may implement any of the power control methods described above. - Exemplary Method for Wirelessly Transmitting Power
-
FIG. 6 illustrates a block diagram of an exemplary method for transferring power from a power station to a chargeable receiving device. - Initially, the power station receives authentication information from the receiving device (610). This information can be received via load modulation over the WPT standard, or using any other available communication standard, including NFC, WiFi, Bluetooth, etc. Based on the received authentication information, the power station determines whether the receiving device is authenticated for power transfer (620).
- If the power station determines that the receiving device is not authenticated (620—N), the power station initiates a power theft prevention measure (630). This measure may include decommissioning power to coils corresponding to the receiving device, shifting frequencies of those coils, or shutting down the transmission, among others.
- If, on the other hand, the power station determines that the receiving device is authenticated (620—Y), the power station transmits a report request as well as test power signals (640). The test power signals may be chosen at different power level, different frequencies, and for different loads. In response to the report request, the power station receives a received power report from the receiving device (650) that reports the amount of power actually received for the different test power signals.
- Based on the report, the power station determines whether the receiving device is authenticated (660). This second authentication may be performed by comparing the reported power levels to expected/estimated power levels. If the reported levels are too low compared to the estimated levels, then the power station determines that the receiving device failed the power report authentication (660—N). When this occurs, the power station implements one or more of the power theft prevention measures detailed above (630).
- If, on the other hand, the power station determines that the reported power values are sufficient close to the estimated values, then the power station authenticates the receiving device (660—Y). Once the receiving device has successfully passed the second authentication (660—Y), the power station begins transmitting power (670).
- During power transmission (670), the power station can periodically request an updated received power report from the receiving device (640) in order to verify that proper tracking is being performed. When this occurs, the power station proceeds back through
steps - Those skilled in the relevant art(s) will recognize that the above method can additionally or alternatively include any of the functionality of the
power station 110 discussed above, as well as any of its modifications. Further, the above description of the exemplary method should neither be construed to limit the method nor the description of the mobiledevice power station 110. - Exemplary Computer System Implementation
- It will be apparent to persons skilled in the relevant art(s) that various elements and features of the present disclosure, as described herein, can be implemented in hardware using analog and/or digital circuits, in software, through the execution of instructions by one or more general purpose or special-purpose processors, or as a combination of hardware and software.
- The following description of a general purpose computer system is provided for the sake of completeness. Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system. An example of such a
computer system 700 is shown inFIG. 7 . One or more of the modules depicted in the previous figures can be at least partially implemented on one or moredistinct computer systems 700. -
Computer system 700 includes one or more processors, such asprocessor 704.Processor 704 can be a special purpose or a general purpose digital signal processor.Processor 704 is connected to a communication infrastructure 702 (for example, a bus or network). Various software implementations are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person skilled in the relevant art(s) how to implement the disclosure using other computer systems and/or computer architectures. -
Computer system 700 also includes amain memory 706, preferably random access memory (RAM), and may also include asecondary memory 708.Secondary memory 708 may include, for example, ahard disk drive 710 and/or aremovable storage drive 712, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like.Removable storage drive 712 reads from and/or writes to aremovable storage unit 716 in a well-known manner.Removable storage unit 716 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to byremovable storage drive 712. As will be appreciated by persons skilled in the relevant art(s),removable storage unit 716 includes a computer usable storage medium having stored therein computer software and/or data. - In alternative implementations,
secondary memory 708 may include other similar means for allowing computer programs or other instructions to be loaded intocomputer system 700. Such means may include, for example, aremovable storage unit 718 and aninterface 714. Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 718 andinterfaces 714 which allow software and data to be transferred fromremovable storage unit 718 tocomputer system 700. -
Computer system 700 may also include a communications interface 720. Communications interface 720 allows software and data to be transferred betweencomputer system 700 and external devices. Examples of communications interface 720 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred via communications interface 720 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 720. These signals are provided to communications interface 720 via acommunications path 722.Communications path 722 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels. - As used herein, the terms “computer program medium” and “computer readable medium” are used to generally refer to tangible storage media such as
removable storage units hard disk drive 710. These computer program products are means for providing software tocomputer system 700. - Computer programs (also called computer control logic) are stored in
main memory 706 and/orsecondary memory 708. Computer programs may also be received via communications interface 720. Such computer programs, when executed, enable thecomputer system 700 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enableprocessor 704 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of thecomputer system 700. Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded intocomputer system 700 usingremovable storage drive 712,interface 714, or communications interface 720. - In another embodiment, features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays. Implementation of a hardware state machine so as to perform the functions described herein will also be apparent to persons skilled in the relevant art(s).
- It is to be appreciated that the Detailed Description section, and not the Abstract section, is intended to be used to interpret the claims. The Abstract section may set forth one or more, but not all exemplary embodiments, and thus, is not intended to limit the disclosure and the appended claims in any way.
- The invention has been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof. The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries may be defined so long as the specified functions and relationships thereof are appropriately performed.
- It will be apparent to those skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the disclosure. Thus, the invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/857,457 US20140183964A1 (en) | 2012-12-28 | 2013-04-05 | Power Transmitting Device Having Power Theft Detection and Prevention |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261747061P | 2012-12-28 | 2012-12-28 | |
US13/857,457 US20140183964A1 (en) | 2012-12-28 | 2013-04-05 | Power Transmitting Device Having Power Theft Detection and Prevention |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140183964A1 true US20140183964A1 (en) | 2014-07-03 |
Family
ID=51016351
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/857,457 Abandoned US20140183964A1 (en) | 2012-12-28 | 2013-04-05 | Power Transmitting Device Having Power Theft Detection and Prevention |
Country Status (1)
Country | Link |
---|---|
US (1) | US20140183964A1 (en) |
Cited By (57)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150091386A1 (en) * | 2013-10-01 | 2015-04-02 | Canon Kabushiki Kaisha | Power transmitting apparatus, power receiving apparatus, control methods therefor, and non-transitory computer-readable storage medium |
US20150365135A1 (en) * | 2014-06-11 | 2015-12-17 | Enovate Medical, Llc | Authentication for wireless transfers |
US20160282192A1 (en) * | 2015-03-23 | 2016-09-29 | Nok9 Ab | Testing Device for Wireless Power Transfer and Associated Method |
US20170132902A1 (en) * | 2015-09-03 | 2017-05-11 | Delta Energy & Communications, Inc. | System and Method for Determination and Remediation of Energy Diversion in a Smart Grid Network |
JP2017529823A (en) * | 2014-09-18 | 2017-10-05 | クアルコム,インコーポレイテッド | Apparatus and method for power loss detection |
US9961572B2 (en) | 2015-10-22 | 2018-05-01 | Delta Energy & Communications, Inc. | Augmentation, expansion and self-healing of a geographically distributed mesh network using unmanned aerial vehicle (UAV) technology |
US9985477B2 (en) | 2013-09-30 | 2018-05-29 | Canon Kabushiki Kaisha | Power transmitting apparatus, power receiving apparatus, control methods therefor, program, and computer-readable storage medium |
US10055869B2 (en) | 2015-08-11 | 2018-08-21 | Delta Energy & Communications, Inc. | Enhanced reality system for visualizing, evaluating, diagnosing, optimizing and servicing smart grids and incorporated components |
JP2018530983A (en) * | 2015-09-09 | 2018-10-18 | シーピージー テクノロジーズ、 エルエルシーCpg Technologies, Llc | Wireless power system theft deterrence |
US20180375340A1 (en) * | 2014-08-21 | 2018-12-27 | Energous Corporation | User-configured operational parameters for wireless power transmission control |
US20190074730A1 (en) * | 2017-09-05 | 2019-03-07 | Apple Inc. | Wireless Charging System With Machine-Learning-Based Foreign Object Detection |
US10320241B2 (en) * | 2017-05-17 | 2019-06-11 | Apple Inc. | Wireless charging system with object recognition |
US20190280535A1 (en) * | 2018-03-12 | 2019-09-12 | Mediatek Inc. | Combined Wireless Charging And Position Tracking |
US10476597B2 (en) | 2015-10-22 | 2019-11-12 | Delta Energy & Communications, Inc. | Data transfer facilitation across a distributed mesh network using light and optical based technology |
US10594165B2 (en) | 2015-11-02 | 2020-03-17 | Energous Corporation | Stamped three-dimensional antenna |
US10652633B2 (en) | 2016-08-15 | 2020-05-12 | Delta Energy & Communications, Inc. | Integrated solutions of Internet of Things and smart grid network pertaining to communication, data and asset serialization, and data modeling algorithms |
US10658878B2 (en) | 2018-08-31 | 2020-05-19 | Apple Inc. | Wireless charging system with temperature sensor array |
US10791020B2 (en) | 2016-02-24 | 2020-09-29 | Delta Energy & Communications, Inc. | Distributed 802.11S mesh network using transformer module hardware for the capture and transmission of data |
US10840743B2 (en) | 2016-12-12 | 2020-11-17 | Energous Corporation | Circuit for managing wireless power transmitting devices |
US10848853B2 (en) | 2017-06-23 | 2020-11-24 | Energous Corporation | Systems, methods, and devices for utilizing a wire of a sound-producing device as an antenna for receipt of wirelessly delivered power |
US10923954B2 (en) | 2016-11-03 | 2021-02-16 | Energous Corporation | Wireless power receiver with a synchronous rectifier |
US10965164B2 (en) | 2012-07-06 | 2021-03-30 | Energous Corporation | Systems and methods of wirelessly delivering power to a receiver device |
US10985617B1 (en) | 2019-12-31 | 2021-04-20 | Energous Corporation | System for wirelessly transmitting energy at a near-field distance without using beam-forming control |
US10992185B2 (en) | 2012-07-06 | 2021-04-27 | Energous Corporation | Systems and methods of using electromagnetic waves to wirelessly deliver power to game controllers |
US10992187B2 (en) | 2012-07-06 | 2021-04-27 | Energous Corporation | System and methods of using electromagnetic waves to wirelessly deliver power to electronic devices |
US11011942B2 (en) | 2017-03-30 | 2021-05-18 | Energous Corporation | Flat antennas having two or more resonant frequencies for use in wireless power transmission systems |
US11018779B2 (en) | 2019-02-06 | 2021-05-25 | Energous Corporation | Systems and methods of estimating optimal phases to use for individual antennas in an antenna array |
US11056929B2 (en) | 2015-09-16 | 2021-07-06 | Energous Corporation | Systems and methods of object detection in wireless power charging systems |
US11063476B2 (en) | 2017-01-24 | 2021-07-13 | Energous Corporation | Microstrip antennas for wireless power transmitters |
US11139699B2 (en) | 2019-09-20 | 2021-10-05 | Energous Corporation | Classifying and detecting foreign objects using a power amplifier controller integrated circuit in wireless power transmission systems |
US11172273B2 (en) | 2015-08-10 | 2021-11-09 | Delta Energy & Communications, Inc. | Transformer monitor, communications and data collection device |
US11196621B2 (en) | 2015-10-02 | 2021-12-07 | Delta Energy & Communications, Inc. | Supplemental and alternative digital data delivery and receipt mesh net work realized through the placement of enhanced transformer mounted monitoring devices |
US11245289B2 (en) | 2016-12-12 | 2022-02-08 | Energous Corporation | Circuit for managing wireless power transmitting devices |
US11342798B2 (en) | 2017-10-30 | 2022-05-24 | Energous Corporation | Systems and methods for managing coexistence of wireless-power signals and data signals operating in a same frequency band |
US11355966B2 (en) | 2019-12-13 | 2022-06-07 | Energous Corporation | Charging pad with guiding contours to align an electronic device on the charging pad and efficiently transfer near-field radio-frequency energy to the electronic device |
US11381118B2 (en) | 2019-09-20 | 2022-07-05 | Energous Corporation | Systems and methods for machine learning based foreign object detection for wireless power transmission |
US11411441B2 (en) | 2019-09-20 | 2022-08-09 | Energous Corporation | Systems and methods of protecting wireless power receivers using multiple rectifiers and establishing in-band communications using multiple rectifiers |
US11437735B2 (en) | 2018-11-14 | 2022-09-06 | Energous Corporation | Systems for receiving electromagnetic energy using antennas that are minimally affected by the presence of the human body |
US11462949B2 (en) | 2017-05-16 | 2022-10-04 | Wireless electrical Grid LAN, WiGL Inc | Wireless charging method and system |
US11502551B2 (en) | 2012-07-06 | 2022-11-15 | Energous Corporation | Wirelessly charging multiple wireless-power receivers using different subsets of an antenna array to focus energy at different locations |
CN115356675A (en) * | 2022-07-12 | 2022-11-18 | 海南电网有限责任公司 | Electric power measurement data abnormity detection system |
US11539243B2 (en) | 2019-01-28 | 2022-12-27 | Energous Corporation | Systems and methods for miniaturized antenna for wireless power transmissions |
US20230001805A1 (en) * | 2021-06-30 | 2023-01-05 | Toyota Jidosha Kabushiki Kaisha | Server |
US11689045B2 (en) | 2015-12-24 | 2023-06-27 | Energous Corporation | Near-held wireless power transmission techniques |
US11710321B2 (en) | 2015-09-16 | 2023-07-25 | Energous Corporation | Systems and methods of object detection in wireless power charging systems |
US11722177B2 (en) | 2013-06-03 | 2023-08-08 | Energous Corporation | Wireless power receivers that are externally attachable to electronic devices |
CN116777121A (en) * | 2023-08-18 | 2023-09-19 | 武汉振铭科技发展有限公司 | Illegal electricity consumption checking method based on big data, storage medium and electronic equipment |
US11799324B2 (en) | 2020-04-13 | 2023-10-24 | Energous Corporation | Wireless-power transmitting device for creating a uniform near-field charging area |
US11831361B2 (en) | 2019-09-20 | 2023-11-28 | Energous Corporation | Systems and methods for machine learning based foreign object detection for wireless power transmission |
US11863001B2 (en) | 2015-12-24 | 2024-01-02 | Energous Corporation | Near-field antenna for wireless power transmission with antenna elements that follow meandering patterns |
US11916398B2 (en) | 2021-12-29 | 2024-02-27 | Energous Corporation | Small form-factor devices with integrated and modular harvesting receivers, and shelving-mounted wireless-power transmitters for use therewith |
US12057715B2 (en) | 2012-07-06 | 2024-08-06 | Energous Corporation | Systems and methods of wirelessly delivering power to a wireless-power receiver device in response to a change of orientation of the wireless-power receiver device |
US12074452B2 (en) | 2017-05-16 | 2024-08-27 | Wireless Electrical Grid Lan, Wigl Inc. | Networked wireless charging system |
US12074460B2 (en) | 2017-05-16 | 2024-08-27 | Wireless Electrical Grid Lan, Wigl Inc. | Rechargeable wireless power bank and method of using |
US12142939B2 (en) | 2022-05-13 | 2024-11-12 | Energous Corporation | Integrated wireless-power-transmission platform designed to operate in multiple bands, and multi-band antennas for use therewith |
US12155231B2 (en) | 2019-04-09 | 2024-11-26 | Energous Corporation | Asymmetric spiral antennas for wireless power transmission and reception |
US12224599B2 (en) | 2020-08-12 | 2025-02-11 | Energous Corporation | Systems and methods for secure wireless transmission of power using unidirectional communication signals from a wireless-power-receiving device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110285213A1 (en) * | 2009-02-04 | 2011-11-24 | Intel Mobile Communications Technology GmbH | Determining device, method for determining of transmitting parameter, energy transmitting device and method for wirelessly transmitting energy |
US20120212071A1 (en) * | 2011-02-21 | 2012-08-23 | Sony Corporation | Power transmission device, power transmission method, and power transmission system |
US20130093257A1 (en) * | 2011-08-25 | 2013-04-18 | Panasonic Corporation | Method for detecting metal foreign object in contactless power supply system, contactless power supply device, power reception device, and contactless power supply system |
US20130147279A1 (en) * | 2011-12-13 | 2013-06-13 | Texas Instruments Incorporated | Wireless Power Transmission with Improved Modulation Ripple |
-
2013
- 2013-04-05 US US13/857,457 patent/US20140183964A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110285213A1 (en) * | 2009-02-04 | 2011-11-24 | Intel Mobile Communications Technology GmbH | Determining device, method for determining of transmitting parameter, energy transmitting device and method for wirelessly transmitting energy |
US20120212071A1 (en) * | 2011-02-21 | 2012-08-23 | Sony Corporation | Power transmission device, power transmission method, and power transmission system |
US20130093257A1 (en) * | 2011-08-25 | 2013-04-18 | Panasonic Corporation | Method for detecting metal foreign object in contactless power supply system, contactless power supply device, power reception device, and contactless power supply system |
US20130147279A1 (en) * | 2011-12-13 | 2013-06-13 | Texas Instruments Incorporated | Wireless Power Transmission with Improved Modulation Ripple |
Cited By (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10992185B2 (en) | 2012-07-06 | 2021-04-27 | Energous Corporation | Systems and methods of using electromagnetic waves to wirelessly deliver power to game controllers |
US12166363B2 (en) | 2012-07-06 | 2024-12-10 | Energous Corporation | System and methods of using electromagnetic waves to wirelessly deliver power to security cameras and adjusting wireless delivery of power to the security cameras as they move |
US10992187B2 (en) | 2012-07-06 | 2021-04-27 | Energous Corporation | System and methods of using electromagnetic waves to wirelessly deliver power to electronic devices |
US10965164B2 (en) | 2012-07-06 | 2021-03-30 | Energous Corporation | Systems and methods of wirelessly delivering power to a receiver device |
US12057715B2 (en) | 2012-07-06 | 2024-08-06 | Energous Corporation | Systems and methods of wirelessly delivering power to a wireless-power receiver device in response to a change of orientation of the wireless-power receiver device |
US11652369B2 (en) | 2012-07-06 | 2023-05-16 | Energous Corporation | Systems and methods of determining a location of a receiver device and wirelessly delivering power to a focus region associated with the receiver device |
US11502551B2 (en) | 2012-07-06 | 2022-11-15 | Energous Corporation | Wirelessly charging multiple wireless-power receivers using different subsets of an antenna array to focus energy at different locations |
US11722177B2 (en) | 2013-06-03 | 2023-08-08 | Energous Corporation | Wireless power receivers that are externally attachable to electronic devices |
US9985477B2 (en) | 2013-09-30 | 2018-05-29 | Canon Kabushiki Kaisha | Power transmitting apparatus, power receiving apparatus, control methods therefor, program, and computer-readable storage medium |
US10700552B2 (en) | 2013-09-30 | 2020-06-30 | Canon Kabushiki Kaisha | Power transmitting apparatus, power receiving apparatus, control methods therefor, program, and computer-readable storage medium |
US10326308B2 (en) | 2013-09-30 | 2019-06-18 | Canon Kabushiki Kaisha | Power transmitting apparatus, power receiving apparatus, control methods therefor, program, and computer-readable storage medium |
US11201507B2 (en) | 2013-10-01 | 2021-12-14 | Canon Kabushiki Kaisha | Power transmitting apparatus, power receiving apparatus, control methods therefor, and non-transitory computer-readable storage medium |
US20150091386A1 (en) * | 2013-10-01 | 2015-04-02 | Canon Kabushiki Kaisha | Power transmitting apparatus, power receiving apparatus, control methods therefor, and non-transitory computer-readable storage medium |
US10263477B2 (en) * | 2013-10-01 | 2019-04-16 | Canon Kabushiki Kaisha | Power transmitting apparatus, power receiving apparatus, control methods therefor, and non-transitory computer-readable storage medium |
US20150365135A1 (en) * | 2014-06-11 | 2015-12-17 | Enovate Medical, Llc | Authentication for wireless transfers |
US10790674B2 (en) * | 2014-08-21 | 2020-09-29 | Energous Corporation | User-configured operational parameters for wireless power transmission control |
US20180375340A1 (en) * | 2014-08-21 | 2018-12-27 | Energous Corporation | User-configured operational parameters for wireless power transmission control |
JP2017529823A (en) * | 2014-09-18 | 2017-10-05 | クアルコム,インコーポレイテッド | Apparatus and method for power loss detection |
US20160282192A1 (en) * | 2015-03-23 | 2016-09-29 | Nok9 Ab | Testing Device for Wireless Power Transfer and Associated Method |
US9739668B2 (en) * | 2015-03-23 | 2017-08-22 | Nok9 Ab | Testing device for wireless power transfer and associated method |
US11172273B2 (en) | 2015-08-10 | 2021-11-09 | Delta Energy & Communications, Inc. | Transformer monitor, communications and data collection device |
US10055869B2 (en) | 2015-08-11 | 2018-08-21 | Delta Energy & Communications, Inc. | Enhanced reality system for visualizing, evaluating, diagnosing, optimizing and servicing smart grids and incorporated components |
US20170132902A1 (en) * | 2015-09-03 | 2017-05-11 | Delta Energy & Communications, Inc. | System and Method for Determination and Remediation of Energy Diversion in a Smart Grid Network |
US10055966B2 (en) * | 2015-09-03 | 2018-08-21 | Delta Energy & Communications, Inc. | System and method for determination and remediation of energy diversion in a smart grid network |
JP2018530983A (en) * | 2015-09-09 | 2018-10-18 | シーピージー テクノロジーズ、 エルエルシーCpg Technologies, Llc | Wireless power system theft deterrence |
US11056929B2 (en) | 2015-09-16 | 2021-07-06 | Energous Corporation | Systems and methods of object detection in wireless power charging systems |
US11710321B2 (en) | 2015-09-16 | 2023-07-25 | Energous Corporation | Systems and methods of object detection in wireless power charging systems |
US12131546B2 (en) | 2015-09-16 | 2024-10-29 | Energous Corporation | Systems and methods of object detection in wireless power charging systems |
US11196621B2 (en) | 2015-10-02 | 2021-12-07 | Delta Energy & Communications, Inc. | Supplemental and alternative digital data delivery and receipt mesh net work realized through the placement of enhanced transformer mounted monitoring devices |
US9961572B2 (en) | 2015-10-22 | 2018-05-01 | Delta Energy & Communications, Inc. | Augmentation, expansion and self-healing of a geographically distributed mesh network using unmanned aerial vehicle (UAV) technology |
US10476597B2 (en) | 2015-10-22 | 2019-11-12 | Delta Energy & Communications, Inc. | Data transfer facilitation across a distributed mesh network using light and optical based technology |
US10594165B2 (en) | 2015-11-02 | 2020-03-17 | Energous Corporation | Stamped three-dimensional antenna |
US11863001B2 (en) | 2015-12-24 | 2024-01-02 | Energous Corporation | Near-field antenna for wireless power transmission with antenna elements that follow meandering patterns |
US10879740B2 (en) | 2015-12-24 | 2020-12-29 | Energous Corporation | Electronic device with antenna elements that follow meandering patterns for receiving wireless power from a near-field antenna |
US12272986B2 (en) | 2015-12-24 | 2025-04-08 | Energous Corporation | Near-field wireless power transmission techniques |
US11451096B2 (en) | 2015-12-24 | 2022-09-20 | Energous Corporation | Near-field wireless-power-transmission system that includes first and second dipole antenna elements that are switchably coupled to a power amplifier and an impedance-adjusting component |
US11689045B2 (en) | 2015-12-24 | 2023-06-27 | Energous Corporation | Near-held wireless power transmission techniques |
US10791020B2 (en) | 2016-02-24 | 2020-09-29 | Delta Energy & Communications, Inc. | Distributed 802.11S mesh network using transformer module hardware for the capture and transmission of data |
US10652633B2 (en) | 2016-08-15 | 2020-05-12 | Delta Energy & Communications, Inc. | Integrated solutions of Internet of Things and smart grid network pertaining to communication, data and asset serialization, and data modeling algorithms |
US10923954B2 (en) | 2016-11-03 | 2021-02-16 | Energous Corporation | Wireless power receiver with a synchronous rectifier |
US11777342B2 (en) | 2016-11-03 | 2023-10-03 | Energous Corporation | Wireless power receiver with a transistor rectifier |
US10840743B2 (en) | 2016-12-12 | 2020-11-17 | Energous Corporation | Circuit for managing wireless power transmitting devices |
US11245289B2 (en) | 2016-12-12 | 2022-02-08 | Energous Corporation | Circuit for managing wireless power transmitting devices |
US12027899B2 (en) | 2016-12-12 | 2024-07-02 | Energous Corporation | Circuit for managing wireless power transmitting devices |
US11594902B2 (en) | 2016-12-12 | 2023-02-28 | Energous Corporation | Circuit for managing multi-band operations of a wireless power transmitting device |
US11063476B2 (en) | 2017-01-24 | 2021-07-13 | Energous Corporation | Microstrip antennas for wireless power transmitters |
US11011942B2 (en) | 2017-03-30 | 2021-05-18 | Energous Corporation | Flat antennas having two or more resonant frequencies for use in wireless power transmission systems |
US12074452B2 (en) | 2017-05-16 | 2024-08-27 | Wireless Electrical Grid Lan, Wigl Inc. | Networked wireless charging system |
US12074460B2 (en) | 2017-05-16 | 2024-08-27 | Wireless Electrical Grid Lan, Wigl Inc. | Rechargeable wireless power bank and method of using |
US11462949B2 (en) | 2017-05-16 | 2022-10-04 | Wireless electrical Grid LAN, WiGL Inc | Wireless charging method and system |
US10320241B2 (en) * | 2017-05-17 | 2019-06-11 | Apple Inc. | Wireless charging system with object recognition |
US11218795B2 (en) | 2017-06-23 | 2022-01-04 | Energous Corporation | Systems, methods, and devices for utilizing a wire of a sound-producing device as an antenna for receipt of wirelessly delivered power |
US10848853B2 (en) | 2017-06-23 | 2020-11-24 | Energous Corporation | Systems, methods, and devices for utilizing a wire of a sound-producing device as an antenna for receipt of wirelessly delivered power |
US11025098B2 (en) * | 2017-09-05 | 2021-06-01 | Apple Inc. | Wireless charging system with machine-learning-based foreign object detection |
US20190074730A1 (en) * | 2017-09-05 | 2019-03-07 | Apple Inc. | Wireless Charging System With Machine-Learning-Based Foreign Object Detection |
US11342798B2 (en) | 2017-10-30 | 2022-05-24 | Energous Corporation | Systems and methods for managing coexistence of wireless-power signals and data signals operating in a same frequency band |
US11817721B2 (en) | 2017-10-30 | 2023-11-14 | Energous Corporation | Systems and methods for managing coexistence of wireless-power signals and data signals operating in a same frequency band |
US20190280535A1 (en) * | 2018-03-12 | 2019-09-12 | Mediatek Inc. | Combined Wireless Charging And Position Tracking |
US10923968B2 (en) * | 2018-03-12 | 2021-02-16 | Mediatek Inc. | Combined wireless charging and position tracking |
CN110266065A (en) * | 2018-03-12 | 2019-09-20 | 联发科技股份有限公司 | Method and apparatus for wireless charging and location tracking |
US10658878B2 (en) | 2018-08-31 | 2020-05-19 | Apple Inc. | Wireless charging system with temperature sensor array |
US12132261B2 (en) | 2018-11-14 | 2024-10-29 | Energous Corporation | Systems for receiving electromagnetic energy using antennas that are minimally affected by the presence of the human body |
US11437735B2 (en) | 2018-11-14 | 2022-09-06 | Energous Corporation | Systems for receiving electromagnetic energy using antennas that are minimally affected by the presence of the human body |
US11539243B2 (en) | 2019-01-28 | 2022-12-27 | Energous Corporation | Systems and methods for miniaturized antenna for wireless power transmissions |
US11018779B2 (en) | 2019-02-06 | 2021-05-25 | Energous Corporation | Systems and methods of estimating optimal phases to use for individual antennas in an antenna array |
US11463179B2 (en) | 2019-02-06 | 2022-10-04 | Energous Corporation | Systems and methods of estimating optimal phases to use for individual antennas in an antenna array |
US11784726B2 (en) | 2019-02-06 | 2023-10-10 | Energous Corporation | Systems and methods of estimating optimal phases to use for individual antennas in an antenna array |
US12155231B2 (en) | 2019-04-09 | 2024-11-26 | Energous Corporation | Asymmetric spiral antennas for wireless power transmission and reception |
US11799328B2 (en) | 2019-09-20 | 2023-10-24 | Energous Corporation | Systems and methods of protecting wireless power receivers using surge protection provided by a rectifier, a depletion mode switch, and a coupling mechanism having multiple coupling locations |
US12074459B2 (en) | 2019-09-20 | 2024-08-27 | Energous Corporation | Classifying and detecting foreign objects using a power amplifier controller integrated circuit in wireless power transmission systems |
US11139699B2 (en) | 2019-09-20 | 2021-10-05 | Energous Corporation | Classifying and detecting foreign objects using a power amplifier controller integrated circuit in wireless power transmission systems |
US11831361B2 (en) | 2019-09-20 | 2023-11-28 | Energous Corporation | Systems and methods for machine learning based foreign object detection for wireless power transmission |
US11715980B2 (en) | 2019-09-20 | 2023-08-01 | Energous Corporation | Classifying and detecting foreign objects using a power amplifier controller integrated circuit in wireless power transmission systems |
US11381118B2 (en) | 2019-09-20 | 2022-07-05 | Energous Corporation | Systems and methods for machine learning based foreign object detection for wireless power transmission |
US11411441B2 (en) | 2019-09-20 | 2022-08-09 | Energous Corporation | Systems and methods of protecting wireless power receivers using multiple rectifiers and establishing in-band communications using multiple rectifiers |
US11355966B2 (en) | 2019-12-13 | 2022-06-07 | Energous Corporation | Charging pad with guiding contours to align an electronic device on the charging pad and efficiently transfer near-field radio-frequency energy to the electronic device |
US12218519B2 (en) | 2019-12-13 | 2025-02-04 | Energous Corporation | Charging pad with guiding contours to align an electronic device on the charging pad |
US11817719B2 (en) | 2019-12-31 | 2023-11-14 | Energous Corporation | Systems and methods for controlling and managing operation of one or more power amplifiers to optimize the performance of one or more antennas |
US10985617B1 (en) | 2019-12-31 | 2021-04-20 | Energous Corporation | System for wirelessly transmitting energy at a near-field distance without using beam-forming control |
US12100971B2 (en) | 2019-12-31 | 2024-09-24 | Energous Corporation | Systems and methods for determining a keep-out zone of a wireless power transmitter |
US11411437B2 (en) | 2019-12-31 | 2022-08-09 | Energous Corporation | System for wirelessly transmitting energy without using beam-forming control |
US11799324B2 (en) | 2020-04-13 | 2023-10-24 | Energous Corporation | Wireless-power transmitting device for creating a uniform near-field charging area |
US12224599B2 (en) | 2020-08-12 | 2025-02-11 | Energous Corporation | Systems and methods for secure wireless transmission of power using unidirectional communication signals from a wireless-power-receiving device |
US20230001805A1 (en) * | 2021-06-30 | 2023-01-05 | Toyota Jidosha Kabushiki Kaisha | Server |
US11916398B2 (en) | 2021-12-29 | 2024-02-27 | Energous Corporation | Small form-factor devices with integrated and modular harvesting receivers, and shelving-mounted wireless-power transmitters for use therewith |
US12142939B2 (en) | 2022-05-13 | 2024-11-12 | Energous Corporation | Integrated wireless-power-transmission platform designed to operate in multiple bands, and multi-band antennas for use therewith |
CN115356675A (en) * | 2022-07-12 | 2022-11-18 | 海南电网有限责任公司 | Electric power measurement data abnormity detection system |
CN116777121A (en) * | 2023-08-18 | 2023-09-19 | 武汉振铭科技发展有限公司 | Illegal electricity consumption checking method based on big data, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20140183964A1 (en) | Power Transmitting Device Having Power Theft Detection and Prevention | |
KR101531006B1 (en) | Detecting a communication tap via signal monitoring | |
Zhang et al. | Real-time alarming, monitoring, and locating for non-hard-hat use in construction | |
CN113844313A (en) | Method and system for distributing power to multiple loads | |
US20150179037A1 (en) | Using data fusion to electronically detect liquid in mobile devices | |
KR20180097981A (en) | Method and apparatus for authenticating car smart key | |
CN113263945A (en) | Method and system for supplying power to a plurality of loads having current measurements | |
KR20140134267A (en) | Power supply device and power receiving device with billing processing unit | |
CA2901672A1 (en) | Proximity detection | |
EP2879269B1 (en) | Bank card presence detection to avoid a wireless charger demagnetizing a bank card | |
JP2015122016A (en) | Gate device, communication equipment, communication system, gate control method, and program | |
JP2015164368A (en) | Foreign substance detection device, power transmission device, power reception device and wireless power transmission system | |
US11201506B2 (en) | Power transfer system, power receiving apparatus, control method, and storage medium | |
US8792862B1 (en) | Providing enhanced security for wireless telecommunications devices | |
CN111563988B (en) | Gate pass authentication method, system and computer storage medium | |
JP6592937B2 (en) | Authentication system, authentication control device program | |
KR20200094899A (en) | Mobile Charger for Electric Vehicle | |
KR101691540B1 (en) | System for reading electric power amount | |
KR101673642B1 (en) | Digital protective relay and power meter | |
JP7309943B2 (en) | Authentication system and mobile terminal | |
KR101932056B1 (en) | Remote integrated management system using gas control system through analysis of digital amount of gas usage data and thermal sensor | |
US8934940B1 (en) | Providing enhanced security for wireless telecommunications devices | |
KR101863665B1 (en) | Power control system using smart electric connector | |
JP2008515265A (en) | Neighborhood evaluation method and system | |
KR101979984B1 (en) | Plug discriminating and sensing device connected to smart electric connector and charging control system thereusing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BROADCOM CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WALLEY, JOHN;REEL/FRAME:030160/0867 Effective date: 20130401 |
|
AS | Assignment |
Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001 Effective date: 20160201 Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001 Effective date: 20160201 |
|
AS | Assignment |
Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD., SINGAPORE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001 Effective date: 20170120 Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001 Effective date: 20170120 |
|
AS | Assignment |
Owner name: BROADCOM CORPORATION, CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:041712/0001 Effective date: 20170119 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |