WO2020134894A1 - Procédé et dispositif de charge - Google Patents

Procédé et dispositif de charge Download PDF

Info

Publication number
WO2020134894A1
WO2020134894A1 PCT/CN2019/122527 CN2019122527W WO2020134894A1 WO 2020134894 A1 WO2020134894 A1 WO 2020134894A1 CN 2019122527 W CN2019122527 W CN 2019122527W WO 2020134894 A1 WO2020134894 A1 WO 2020134894A1
Authority
WO
WIPO (PCT)
Prior art keywords
charger
identification
charged device
vdm
mode
Prior art date
Application number
PCT/CN2019/122527
Other languages
English (en)
Chinese (zh)
Inventor
段利华
常向阳
陈昱充
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2020134894A1 publication Critical patent/WO2020134894A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries

Definitions

  • This application relates to the technical field of power supply and distribution, in particular to a charging method and equipment.
  • USB universal serial bus
  • PC personal computers
  • the terminal products in USB PD can support Type C USB interface defined by the USB Association, referred to as Type-C interface.
  • Type-C interface defines Type C USB interface defined by the USB Association, referred to as Type-C interface.
  • the advantage of the USB Type-C interface is that it supports double-sided insertion of the USB interface, which is more slim and concise.
  • the design has a faster transmission speed (up to 10Gbps) and a more powerful circuit transmission (up to 100W). Due to these advantages, it can quickly charge the terminal products to meet the charging needs of customers.
  • the present application provides a charging method and device for implementing accurate identification between a charger and a charged device.
  • the following technical solutions are specifically disclosed:
  • an embodiment of the present application provides a charging method.
  • the method is applied to a charged device connected to a charger, and the charged device is in a manufacturer-defined message VDM mode.
  • the method includes:
  • the charged device sends a first identification to the charger when the charger enters the VDM mode, where the first identification is an identification that satisfies the first agreed relationship with the charger, or is The encrypted first data in the VDM mode; the charged device receives the second identification sent by the charger; if the second identification is an identification that satisfies the first agreed relationship with the charger, or If the data is correctly decrypted from the first data, it is determined that the charged device and the charger are successfully identified.
  • the first identification may be carried by a first message
  • the second identification may be carried by a second message.
  • the two parties when both the charged device and the charger enter the VDM mode, the two parties reach a consensus on the configuration of the information, so the charged device sends the first logo with certain conditions and receives the feedback from the charger.
  • the second identifier because the first identifier and the second identifier configured in the VDM mode satisfy the first agreed relationship, or the second identifier is data that correctly decrypts the first identifier, it is determined that the received second identifier is valid, Furthermore, accurate identification of the charger and the charged device is realized, and the match between the charger and the charged device is ensured.
  • the charged device in the VDM mode, sends the encrypted first data to the charger, thereby increasing the complexity of information transmission, and improving the security of transmission and the accuracy of identification of both parties.
  • the receiving the second identifier sent by the charger by the charged device includes: the charged device receives the charger within a preset time period At least one second sub-identity sent; the charged device combines the at least one second sub-identity into the second identity.
  • sending the first identification to the charger includes: the charged device passing the first user-defined data object VDO or the first unstructured VDM message The first identifier is sent in a manner that the header carries the first identifier.
  • the method before sending the first identification to the charger, the method further includes: the charged device sends a third identification to the charger, and the third identification It is used to notify the charger to enter the VDM mode; the charged device receives a fourth identifier fed back by the charger according to the third identifier, and the fourth identifier is used to indicate that the charger has entered the VDM mode Describe the VDM mode.
  • the method before sending the first identification to the charger, the method further includes: the charged device confirms the identity information, standard number, or supplier number of the charger SVID information and VDM mode information.
  • the method further includes: the charged device enters a smart charging mode; the charged device The charger sends a request message for requesting the first voltage and the first current output by the charger; the charged device receives the first voltage and the output of the charger according to the request message A first current, and charge according to the first voltage and the first current.
  • the charged device can request the charger to output a larger voltage or current at any time according to the working state, thereby accelerating the charging speed and improving the charging efficiency.
  • the method before the charged device sends a request message to the charger, the method further includes: the charged device obtains the charging capability sent by the charger, The charging capability includes at least one set of voltage and current that the charger can output; the charged device determines a first voltage and first current in the at least one set of voltage and circuit, and according to the first voltage And the first current to generate the request message.
  • the charged device may select the first voltage and the first current according to the current load situation.
  • the charged device in the smart charging mode, can request the charger to resend new charging capabilities at any time, and then the charged device can request the charging voltage and current it wants to obtain, so that the charged device reaches the highest
  • the charging efficiency can reduce the power consumption and temperature rise of the whole machine and improve the user experience.
  • the charger in the smart charging mode, can release hidden charging capabilities, and in the case of ensuring safety, arbitrarily adjust the output voltage and current of the charger to achieve faster charging.
  • an embodiment of the present application further provides a charging method, the method is applied to a charger connected to a charged device, and the charger is in a VDM mode, the method includes: the charger is in the VDM Receiving a first identification from the charged device in the mode, wherein the first identification is an identification that satisfies a first agreed relationship with the charger, or the first data encrypted in the VDM mode; The charger searches for a second identifier corresponding to the first identifier according to the first contractual relationship, or decrypts the encrypted first data to generate a second identifier; the charger sends to the charged device The second identifier.
  • the charger sending the second identification to the charged device includes: the charger will assign at least one corresponding to the first identification The second sub-identity, or the decrypted at least one second sub-identity is sent to the charged device, and the at least one second sub-identity is used to combine into the second identity.
  • the charger receiving the first identification from the charged device in the VDM mode includes: the charger receiving the charged The first identifier carried by the device through the first user-defined data object VDO or the first unstructured VDM header.
  • the method before the charger receives the first identification from the charged device in the VDM mode, the method further includes: the charger receives the A third identifier sent by the charged device, the third identifier is used to notify the charger to enter the VDM mode; the charger enters the VDM mode, and generates a fourth identifier according to the third identifier, The fourth identification is used to indicate that the charger has entered the VDM mode; the charger sends the fourth identification to the charged device.
  • the charger before the charger receives the first identification from the charged device in the VDM mode, the charger further includes: Describe the identity information, standard number or supplier number SVID information and VDM mode information between the charged devices.
  • the method further includes: the charger enters an intelligent charging mode under successful identification with the charged device; the charger receives the A request message sent by the charged device, the request message is used to request the first voltage and the first current output by the charger; the charger outputs the first voltage and the first current to the The charged device, so that the charged device is charged according to the first voltage and the first current.
  • the method before the charger receives the request message sent by the charged device, the method further includes: the charger sends a charging capability, and the charging capability includes all At least one set of voltages and currents that can be output by the charger, the at least one set of voltages and currents being used to determine one set of the first voltage and first current for the charged device, so that the The charging device generates the request message according to the first voltage and the first current.
  • an embodiment of the present application further provides a charging device, which is used to implement the foregoing first aspect and various implementation manners of the first aspect, or implement the foregoing second aspect and various implementation manners of the second aspect Charging method.
  • the device includes at least one functional unit or module.
  • the at least one functional module is a receiving module, a processing module, a sending module, and the like.
  • the charging device may be a device to be charged, or may also be a charger.
  • an embodiment of the present application further provides another hardware device, including a processor and a memory, the processor is coupled to the memory, the memory is used to store instructions, and the processor is used to call the instructions Causing the device to perform the method in the foregoing first aspect and various implementations of the first aspect, or the processor is configured to call the instruction to cause the device to execute the foregoing second aspect and various implementations in the second aspect method.
  • the hardware device further includes a transceiver for receiving or sending messages from the peer device.
  • the hardware device is the apparatus according to the third aspect.
  • the hardware device when the hardware device is a charged device, it may be a terminal or a UE; when the hardware device is a charger, it may be Charging treasure or charging power supply.
  • the present application also provides a computer-readable storage medium, including instructions, which when executed on a computer, implement the method described in the foregoing first aspect or various implementation manners of the first aspect, or A method as described in the foregoing second aspect or various implementation manners of the second aspect is implemented.
  • the present application also provides a computer program product that, when running on a computer, implements the method described in the first aspect or various implementations of the first aspect, or implements the second aspect or The method described in various implementations of the second aspect.
  • the two parties when both the charged device and the charger enter the VDM mode, the two parties reach a consensus on the configuration of the information, so the charged device sends the first logo with certain conditions and receives The second identifier fed back by the charger, because the first identifier and the second identifier configured in the VDM mode satisfy the first agreed relationship, or the second identifier is data that correctly decrypts the first identifier, determine the received second identifier
  • the identification is effective, thereby achieving accurate identification of the charger and the charged device, and ensuring that the charger matches the charged device.
  • the charged device in the VDM mode, sends the encrypted first data to the charger, thereby increasing the complexity of information transmission, and improving the security of transmission and the accuracy of identification of both parties.
  • FIG. 1 is a schematic structural diagram of a charger and a charged device according to an embodiment of the present application
  • FIG. 2 is a schematic structural diagram of another charger and a charged device according to an embodiment of the present application.
  • FIG. 3 is a flowchart of a charging method provided by an embodiment of the present application.
  • FIG. 5 is a signaling flowchart of information confirmation performed by a charged device and a charger according to an embodiment of the present application
  • FIG. 6 is a schematic structural diagram of a charged device according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a charger provided by an embodiment of this application.
  • FIG. 8 is a schematic structural diagram of a hardware device provided by an embodiment of the present application.
  • FIG. 1 shows a schematic structural diagram of a typical charger and a charged device, wherein the USB Type-C interface of the charged device 100 (USB interface type C defined by the USB Association) and the charger The USB Type-C interface of 200 is connected through a data line.
  • Both the charged device 100 and the charger 200 include a USB power delivery (PD) chip, and a configuration channel (CC) through the USB Type-C interface.
  • PD USB power delivery
  • CC configuration channel
  • Data communication is performed so that the charged device 100 can recognize the data supported by the charger 200 and charging conditions, such as voltage and current.
  • it may also include channels for transmitting other signals such as power signals, such as other channels.
  • this embodiment also provides a schematic structural diagram of a connection between a charger and a charged device.
  • the structure diagram can be applied to standard Type-C terminal products, such as Belxx project or Watxx project and adapter application scenarios.
  • the charger 100 includes a power module 1001, a PD protocol processing module 1002, a microcontroller module 1003, and a Type-C interface 1004, where the power module 1001, the PD protocol processing module 1002 and the micro The controller modules 1003 are connected through a control interface.
  • the charger 200 includes a power module 2001, a PD protocol processing module 2002, a microcontroller module 2003, and a Type-C interface 2004. Among them, the power module 2001, the PD protocol processing module 2002, and the microcontroller module 2003 Connected through the control interface.
  • a CC is provided between the PD protocol processing module 1002 of the charged device 100 and the PD protocol processing module 2002 of the charger 200 for transmitting CC signals; the power module 1001 of the charged device 100 and the charger 200 A power channel is provided between the power modules 2001 for transmitting power signals and so on.
  • the power supply module 2001 in the charger 200 is used to output a specific voltage and current, and the power supply module 1001 of the charged device 100 can be used to execute a charging strategy.
  • the PD protocol processing module 1002 or the PD protocol processing module 2002 can be used to send and receive USB PD communication packets through a CC channel.
  • the USB PD communication packets include standard PD communication packets and unstructured vendor-defined information communication packets.
  • the microcontroller module 1003 is used to communicate with the PD protocol processing module 1002 in order to acquire various states of the PD protocol processing module 1002 and control it.
  • the microcontroller module can also control the power supply module.
  • the microcontroller module 2003 can control the output voltage and current of the charger 200, and for the charged side, the microcontroller module 1003 can control the power module 1001 to execute a specific charging strategy.
  • the microcontroller module may further include an encryption and decryption module for encrypting or decrypting the transmitted data or signals, and transmitting the encrypted or decrypted information to the PD protocol
  • the processing module after receiving the encrypted or decrypted information, the PD protocol processing module passes the information to the peer device through the CC.
  • the functions of the PD protocol processing module in the charged device 100 and the charger 200 can be implemented by a PD chip.
  • the microcontroller module may be a central processing unit (CPU), a specific integrated circuit (application specific integrated circuit, ASIC), or one or more integrations configured to implement embodiments of the present application Circuits, such as one or more microprocessors (DSPs) or one or more field programmable gate arrays (FPGAs), which are not limited in this embodiment.
  • DSPs microprocessors
  • FPGAs field programmable gate arrays
  • the charged device described in this application may be a terminal, and the terminal may also be called terminal device, user equipment (UE), mobile station (MS), mobile terminal (mobile terminal) , MT), etc.
  • the terminal can be a mobile phone (mobile phone), a tablet computer (Pad), a computer with wireless transceiver function, a virtual reality (virtual reality, VR) terminal device, an augmented reality (augmented reality, AR) terminal device, industrial control (industrial control), wireless terminal in self-driving (self-driving), wireless terminal in remote surgery (remote medical), wireless terminal in smart grid (smart grid), transportation safety (transportation safety) Wireless terminals, wireless terminals in smart cities (smart cities), wireless terminals in smart homes (smart homes), etc.
  • the embodiments of the present application do not limit the specific device form adopted by the terminal.
  • the charger includes but is not limited to a power adapter, a mobile power supply (or charging treasure), a car power supply, or other power supply that can be used for power supply.
  • FIG. 3 it is a flowchart of a charging method provided by an embodiment of the present application.
  • the method can be applied to the application scenario shown in FIG. 1 or FIG. 2. Specifically, the method includes:
  • VDM vendor defined message
  • the charged device when the charged device detects connection with the charger, for example, when the charger is detected to be inserted, the voltage is increased to a preset voltage. Further, the charged device may communicate with the charger through a PD protocol processing module, and then obtain the preset voltage.
  • the charged device sends a first identification to the charger when the charger enters the VDM mode.
  • the first identifier is an identifier that satisfies a first agreed relationship with the charger, or is encrypted first data in the VDM mode.
  • the charger receives the first identification sent by the charged device.
  • sending the first identification to the charger in step 302 includes: a manner in which the charged device carries the first identification through a first user-defined data object VDO or a first unstructured VDM packet header , Send the first identifier.
  • the method further includes: the charged device notifies the charger to enter the VDM mode. Further, it includes: a third identification to the charger by the charged device, the third identification is used to notify the charger to enter the VDM mode; after the charger receives the third identification, to the charger The charged device sends a fourth identification, and the charged device receives the fourth identification fed back by the charger according to the third identification.
  • the fourth identification is used to indicate that the charger has entered the VDM mode. Confirm that all have entered the VDM mode, and initiate a precise identification process in the VDM mode.
  • the user can define some basic functions freely through the user-definable mode (for example, according to the format requirements of the user-defined data object (VDO)), so as to agree on the first Prepare a logo and a second logo, for example, Table 1 below shows the configuration description of the basic functions of a charging application example.
  • VDO user-defined data object
  • unstructured vendor-defined messages (unstructured, defined, VDM) defined by the PD protocol can also be used to transfer information such as data, encryption, and decryption.
  • the format of the unstructured vendor-defined messages may include but not Limited to the content shown in Table 2:
  • the data length of the PD message header can be 16 bits, specifically including the power role, data role type, PD protocol specification version information, and message type of the sending end.
  • the format of the VDM mode is consistent with the custom message format defined by the PD manufacturer, and this part of the vendors does not support customization.
  • the data length of the unstructured VDM header of unstructured manufacturers can be 32 bits.
  • bits 31 to 15 other bits (0 to 14) can be supported.
  • Manufacturer customized In addition, the user-defined data object (VDO) data can be completely customized by the user.
  • the PD protocol can support 6 VDOs, that is, the data length that can be used is 192 bits.
  • the charged device may configure the first identifier in the following two ways.
  • the first implementation manner is that after both the charged device and the charger enter the VDM mode, the charged device generates the first identifier according to the first agreed relationship pre-negotiated with the charger.
  • the first agreed relationship is a corresponding relationship known and saved in advance by both parties.
  • the charged device generates a first identifier in the VDM mode, such as a first character string 0xaaaa, and sends the first identifier to the charger.
  • a first character string is a hexadecimal character string.
  • the charger receives the first identifier sent by the charged device, and searches for a second identifier corresponding to the first identifier according to the first identifier and the first agreed relationship negotiated by both parties in the VDM mode, such as It is the second character string 0xcccc that has the first contract relationship with the first character string 0xaaaa, and then sends the second character string (second identifier) to the charged device.
  • the second character string is a hexadecimal character string.
  • first identifier and the second identifier, or the first character string and the second character string described in this embodiment may be set in a user-defined format, or a fixed value may be used. No restrictions.
  • the second implementation is to configure the encrypted first data according to the format requirements in the VDM mode and use it as the first identifier.
  • the first identifier sent may also be encrypted, for example, the first identifier may be encrypted using advanced encryption Advanced (encryption standard) to ensure accurate identification between the charged device and the charger.
  • VDO user-defined data object
  • the charged device and the charger may encrypt the first data to be transmitted according to the agreed key of both parties.
  • the charged device uses the first key to encrypt the first data to obtain The first identification, and then send the first identification to the charger.
  • the charger receives a first identification from the charged device, the first identification is an identification that satisfies a first agreed relationship with the charger, or in the VDM mode Download the first data encrypted by the first key.
  • the charger searches for a second identification corresponding to the first identification according to the first contractual relationship, or decrypts the encrypted first data to generate a second identification, and sends the second identification to the charged device The second logo.
  • the charger may use the second key to decrypt the first data, and then use the content obtained after decrypting the second key as the second identifier, and send To the charged device.
  • first key and the second key are keys pre-agreed by both parties in the user-defined mode, and the first key and the second key may be the same or different, in this embodiment There are no restrictions on this.
  • the method for encrypting the first identifier described in this embodiment includes, but is not limited to, AES encryption. It should be understood that other encryption methods may also be included, which is not limited in this application, but is charged
  • the device sends encrypted data to the charger.
  • the charged device receives the decrypted data of the charger.
  • the charger sending the second identification to the charged device includes: the charger assigns at least one second sub-identity corresponding to the first identification, or at least one decrypted first sub-identity The two sub-identifiers are sent to the charged device, and the at least one second sub-identifier is used to combine into the second identifier.
  • the charged device receives the second identifier sent by the charger.
  • the charged device receives at least one second sub-identity sent by the charger within a preset time period, and then combines the at least one second sub-identity into the second identity.
  • the charged device determines whether the second identification is valid.
  • the charged device determines that the second identification is an identification that satisfies the first agreed relationship with the charger, or determines whether the second identification is data that correctly decrypts the first data.
  • the charged device judges whether the content in the second logo is the same as the content in the first logo, and the content corresponding to the first logo is based on the negotiation between the two parties in the VDM mode.
  • the identifier of the first engagement relationship for example, the content corresponding to the first character string "0xaaaa” according to the first engagement relationship is "0xcccc".
  • the charged device determines whether the second identification is the same as the data after correctly decrypting the first data.
  • the encrypted first identifier may be a segment of 128-bit long first data encrypted by AES
  • the second identifier may be a segment of 128-bit long second data decrypted by AES.
  • the second identifier is an identifier that satisfies the first agreed relationship with the charger or data that correctly decrypts the first data, determine that the charged device and the charger are identified success.
  • the two parties when both the charged device and the charger enter the VDM mode, the two parties reach a consensus on the configuration of the information, so the charged device sends a first logo with certain conditions and receives charger feedback
  • the second identifier since the first identifier and the second identifier configured in the VDM mode satisfy the first agreed relationship, or the second identifier is data that correctly decrypts the first identifier, it is determined that the received second identifier is valid , And then realize the accurate identification of the charger and the charged device, and ensure that the charger matches the charged device.
  • the charged device in the VDM mode, sends the encrypted first data to the charger, thereby increasing the complexity of information transmission, and improving the security of transmission and the accuracy of identification of both parties.
  • the method provided in this embodiment further includes the following steps:
  • the charged device After being successfully identified with the charger, the charged device enters an intelligent charging mode.
  • the charger also enters the smart charging mode.
  • the charged device obtains the charging capability sent by the charger, and the charging capability includes at least one set of voltage and current that the charger can output.
  • the charged device determines a first voltage and a first current in the at least one set of voltage and circuits, and generates the request message according to the first voltage and the first current.
  • the charged device sends a request message to the charger, where the request message is used to request the first voltage and the first current output by the charger.
  • the charged device receives the first voltage and the first current output by the charger according to the request message, and performs charging according to the first voltage and the first current.
  • the charged device may request the charger to re-send new charging capabilities (source capabilities) at any time, and then the charged device may request the charging voltage and current it wishes to obtain, so that it is charged
  • the device achieves the highest charging efficiency, which can reduce the overall power consumption and temperature rise, and improve the user experience.
  • the terminal is powered by two strings of batteries.
  • the charging power is 40W and the input voltage of the charging chip is 20V, the charging efficiency is 92%, and when the input voltage is reduced to 9V, the charging efficiency can be increased to 95 %, and the power consumption of the entire charging circuit is reduced by 1.2W, and the heat generation is also significantly reduced, so the terminal device can obtain the desired voltage and current by sending a request message to the charger, thereby reducing the heat generation of the link.
  • the charger can release the hidden charging ability.
  • the output voltage and current of the charger can be adjusted arbitrarily.
  • the charged device can request the charger to output according to the current working state. Larger voltage and current, thereby accelerating the charging speed and improving the charging efficiency.
  • the charging cable is used for plugging and unplugging with the terminal of the charged device, so as to realize connection and disconnection with the charged device, and improve the charging safety factor.
  • the method before sending the first identifier in step 302, the method further includes: the charged device confirms the identity information, standard number, or supplier number (Standard or Vendor ID of the charger of the charger, SVID) information and VDM mode information flow. Specifically, as shown in FIG. 5, the method includes:
  • the charged device sends an identity information request message to the charger.
  • the charged device may first query the identity information of the charger.
  • the charged device may send an identity information request message to the charger.
  • the charger sends the identity information of the charger to the charged device. After the charger receives the identity information request message from the charged device, the charger can acquire its own identity information and send the acquired identity information to the charged device.
  • the charged device sends an SVID information request message to the charger.
  • the charged device can determine whether the identity type of the charger is the charger type according to the received identity information, and when it is confirmed that the identity type of the charger is the charger type
  • the charging device also needs to confirm whether the charger matches the charged device.
  • the charged device can send an SVID information request message to the charger to facilitate the charger to report its SVID information.
  • the charger sends the SVID information of the charger to the charged device. Specifically, after receiving the SVID information request message from the charged device, the charger may acquire its own SVID information and report it to the charged device.
  • the charged device sends a VDM request message to the charger.
  • the charged device receives the SVID information of the charger, it can determine whether the charger matches itself according to the received SVID information, and when it is determined that the charger matches itself, the charged device also needs to confirm
  • the user-defined mode supported by the charger for example, the charged device may send a user-defined mode request message to the charger, so that the charger reports the user-defined mode supported by itself.
  • the user-defined mode supported by the charger sent by the charger to the charged device. After receiving the user-defined mode request message sent by the charged device, the charger may report the user-defined mode supported by itself to the charged device.
  • the charged device starts the VDM mode.
  • the terminal device can select a user-defined mode according to the user-defined mode supported by the charger and its own needs, and switch to The user-defined mode.
  • the processing process before transmitting the structured vender defined message defined by the USB PD protocol is consistent, and the purpose is to make the charger enter the user-defined mode.
  • the USB PD stipulates that only the downstream data port (DFP) can initiate a structured user-defined process. If the upstream data port (UFP) needs to initiate a structured user-defined process, you can pass The data role swap defined by the USB PD protocol switches the upstream data port (UFP) to the downstream data port (DFP), and then the downstream data port (DFP) initiates the structure User-defined process.
  • the unstructured user-defined process should also comply with this regulation, that is, when the charged device needs to manage the charger, if the charged device belongs to the downstream data port, then The method flow of steps 501 to 506 can be directly executed. If the charged device belongs to the data port facing the upstream, you may need to switch to the data port facing the downstream before performing the method flow of steps 501 to 506.
  • the charger In the case where the charger is in a user-defined mode, if the charged device needs to manage the charger, it can send an unstructured manufacturer-defined command message for managing the charger to the charger.
  • the charged device may send a non-structure to the charger to notify the charger to switch to the VDM mode
  • the customized command message of the manufacturer, or the charged device needs to know the working status information of the charger.
  • the embodiment of the present application does not limit the specific method of notifying both parties by a message between the charged device and the charger.
  • FIG. 6 it is a schematic structural diagram of a charged device provided by an embodiment of the present application.
  • the charged device is used to implement the charging method in the foregoing embodiment.
  • the device includes: a receiving module 601, a processing module 602, and a sending module 603.
  • a receiving module 601 receives data from a receiving module 601
  • a processing module 602 receives data from a sending module 603.
  • a sending module 603. may also include other functional modules or units, such as a storage module. This embodiment does not limit this.
  • the charged device is connected to the charger and is in a manufacturer-defined message VDM mode.
  • the sending module 603 is configured to send a first identifier to the charger when the charger enters the VDM mode, where the first identifier is an identifier that satisfies the first agreed relationship with the charger, Or the first data encrypted in the VDM mode;
  • the receiving module 601 is used to receive the second identification sent by the charger;
  • the processing module 602 is used to detect if the second identification is satisfied with the charger The identifier of the first agreed relationship, or the data that correctly decrypts the first data, determines that the charged device and the charger are successfully identified.
  • the receiving module 601 is specifically configured to receive at least one second sub-identity sent by the charger within a preset time period, and The second sub-identity is combined into the second identity.
  • the sending module 603 is specifically configured to carry the first identifier through a first user-defined data object VDO or a first unstructured VDM packet header Sending the first identifier.
  • the sending module 603 is further configured to send a third identification to the charger before sending the first identification to the charger.
  • the identifier is used to notify the charger to enter the VDM mode;
  • the receiving module 601 is further used to receive a fourth identifier fed back by the charger according to the third identifier, and the fourth identifier is used to indicate the charging The device has entered the VDM mode.
  • the processing module 602 is further configured to confirm the identity information of the charger before sending the first identification to the charger, Standard number or supplier number SVID information and VDM mode information.
  • the processing module 602 is further configured to enter the smart charging mode after successfully identifying with the charger; the sending module 603 is also used to The charger sends a request message, the request message is used to request the first voltage and the first current output by the charger; the receiving module 601 is further used to receive the first output of the charger according to the request message A voltage and a first current, and charge according to the first voltage and the first current.
  • the receiving module 601 is further configured to acquire the charging capability sent by the charger before sending the request message to the charger, and the charging The capability includes at least one set of voltages and currents that the charger can output; the processing module 602 is also used to determine a first voltage and a first current in the at least one set of voltages and circuits, and according to the first voltage And the first current to generate the request message.
  • this embodiment also provides a charger, which is used to perform the charging method described in the foregoing embodiment, so as to realize accurate identification of the charger and the charged device.
  • the charger includes: a receiving module 701, a processing module 702, and a sending module 703.
  • a receiving module 701 receives a signal from the charger.
  • a processing module 702 receives a signal from the charger.
  • a sending module 703. receives a signal from the charger.
  • it may also include other functional modules or units, such as a storage module. This embodiment does not limit this.
  • the charger is connected to the charged device, and the charger is in a VDM mode.
  • the receiving module 701 is configured to receive the first identification from the charged device in the VDM mode, wherein The first identifier is an identifier that satisfies a first agreed relationship with the charger, or the first data encrypted in the VDM mode;
  • the processing module 702 is configured to search for the first identifier according to the first agreed relationship The corresponding second identification, or decrypt the encrypted first data to generate a second identification;
  • the sending module 703 is used to send the second identification to the charged device.
  • the sending module 703 is specifically configured to associate at least one second sub-identity corresponding to the first identifier, or at least one second sub-entry after decryption
  • the identifier is sent to the charged device, and the at least one second sub-identifier is used to combine into the second identifier.
  • the receiving module 701 is specifically configured to receive a first user-defined data object VDO or a first unstructured VDM packet header of the charged device through the first user-defined data object.
  • the first identifier carried.
  • the receiving module 701 is further configured to receive the charged battery before receiving the first identification from the charged device in the VDM mode A third identifier sent by the device, the third identifier is used to notify the charger to enter the VDM mode; the processing module 702 is also used to enter the VDM mode, and generates a fourth identifier according to the third identifier , The fourth identification is used to indicate that the charger has entered the VDM mode; the sending module 703 is also used to send the fourth identification to the charged device.
  • the processing module 702 is further configured to confirm with the device before receiving the first identification from the charged device in the VDM mode Identity information, standard number or supplier number SVID information and VDM mode information between charging devices.
  • the processing module 702 is further configured to enter an intelligent charging mode when successfully identified with the charged device; the receiving module 701 also uses In order to receive a request message sent by the charged device, the request message is used to request the first voltage and the first current output by the charger; the sending module 703 is further used to convert the first voltage and the The first current is output to the charged device, so that the charged device is charged according to the first voltage and the first current.
  • the sending module 701 is further configured to send a charging capability before receiving the request message sent by the charged device, where the charging capability includes the At least one set of voltage and current that the charger can output, and the at least one set of voltage and current is used to determine one set of the first voltage and first current for the charged device, so that the charged The device generates the request message according to the first voltage and the first current.
  • this embodiment also provides a hardware device.
  • the hardware device may be the charged device in the foregoing embodiment, for example, may be various terminal devices, or components (eg, chips) of the terminal device, or the hardware device may also be the one in the foregoing embodiment
  • a charger wherein the charger includes but is not limited to a power adapter, a mobile power supply (or charging treasure), a vehicle power supply, or other power supply that can be used for power supply.
  • the hardware device further includes at least one port, such as a Type-C interface, and a power module.
  • the device may include a transceiver 801, a processor 802, and may further include a memory 803.
  • the memory 803 is used to store codes or data.
  • the transceiver 801 may include components such as a receiver, a transmitter and an antenna.
  • the device may further include more or less components, or combine certain components, or different component arrangements, which are not limited in this application.
  • the processor 802 is the control center of the hardware device, and uses various interfaces and lines to connect the various parts of the entire device, by running or executing the software program or module stored in the memory 803, and calling the data stored in the memory 803 to execute The charging method described in the foregoing embodiment.
  • the processor 802 may be composed of an integrated circuit (IC), for example, may be composed of a single packaged IC, or may be composed of multiple packaged ICs connected with the same function or different functions.
  • the processor 802 may include only a central processing unit (CPU), or may be a GPU, a digital signal processor (DSP), and a control chip (such as a USB PD chip in the transceiver module) )The combination.
  • the CPU may be a single computing core, or may include multiple computing cores.
  • the processor 1002 may further include a hardware chip.
  • the hardware chip may be an application-specific integrated circuit (ASIC), a programmable logic device (PLD) or a combination thereof.
  • the PLD may be a complex programmable logic device (complex programmable logic device (CPLD), field programmable gate array (FPGA), general array logic (GAL) or any combination thereof.
  • the transceiver 801 is used to establish a communication channel and use the communication channel to implement communication transmission between a hardware device and other devices.
  • the transceiver 801 may be a module that completes the transceiver function.
  • the transceiver 801 may include a wireless local area network (wireless local area network, WLAN) module, a Bluetooth module, a baseband (baseband) module and other communication modules, and a radio frequency (radio frequency (RF) circuit) for wireless local area network Communication, Bluetooth communication, infrared communication, and/or cellular communication system communication, such as wideband code division multiple access (WCDMA) and/or high speed downlink packet access (HSDPA).
  • WCDMA wideband code division multiple access
  • HSDPA high speed downlink packet access
  • the transceiver 801 can support direct memory access.
  • the memory 803 may include volatile memory (volatile memory), such as random access memory (random access memory, RAM); and may also include non-volatile memory (non-volatile memory), such as flash memory (flash memory), A hard disk drive (HDD) or a solid-state drive (SSD); the storage 803 may also include a combination of the aforementioned types of storage.
  • volatile memory volatile memory
  • non-volatile memory non-volatile memory
  • flash memory flash memory
  • HDD hard disk drive
  • SSD solid-state drive
  • a program, code, or data may be stored in the memory, and the processor 802 may implement the accurately recognized function by executing the program or code.
  • the processor 802 and the transceiver 801 may be individually or coupled to implement all or part of the steps in the charging method in the foregoing method embodiments.
  • the transceiver 801 is used to implement the functions of the receiving module 601 and the sending module 603 shown in FIG. 6, or the processor 802 controls the transceiver 801 to implement The functions of the receiving module 601 and the sending module 603, and the processor 802 may also be used to implement various functions of the processing module 602 shown in FIG.
  • the transceiver 801 is used to implement the functions of the receiving module 701 and the sending module 703 shown in FIG. 7, or the processor 802 controls the transceiver 801 to implement To describe the functions of the receiving module 701 and the sending module 703, the processor 802 may also be used to implement various functions of the processing module 702 shown in FIG.
  • the processor 802 is also used to implement various functions of the PD protocol processing module and the microcontroller module shown in FIG. 2.
  • the hardware device further includes a power supply module, such as a power supply or a rechargeable battery, for implementing the function of the power supply module shown in FIG.
  • the present application also provides a computer storage medium, where the computer storage medium may store a program, and when the program is executed, it may include some or all of the steps in the embodiments of the charging method provided by the present application.
  • the storage medium may be a magnetic disk, an optical disk, a read-only storage memory ROM, or a random storage memory RAM.
  • all or part can be implemented by software, hardware, firmware, or any combination thereof.
  • software When implemented using software, it can be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer loads and executes the computer program, all or part of the processes or functions described in the above embodiments of the present application are generated.
  • the computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a network node, computer, server or data center Transmission to another site, computer or server via wired or wireless means.
  • plural means two or more than two.
  • the words “first” and “second” are used to distinguish the same or similar items that have substantially the same functions and functions. Those skilled in the art may understand that the words “first” and “second” do not limit the number and execution order, and the words “first” and “second” do not necessarily mean different.

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

L'invention concerne un procédé et un dispositif de charge, le procédé étant appliqué à un dispositif chargé connecté à un chargeur, et le dispositif chargé étant en mode VDM de message auto-défini de vendeur. Le procédé comprend les étapes suivantes : un dispositif chargé envoie un premier identifiant à un chargeur dans des conditions dans lesquelles le chargeur entre en mode VDM (S302), le premier identifiant étant un identifiant qui satisfait une première relation convenue avec le chargeur, ou étant constitué de premières données cryptées en mode VDM ; le dispositif chargé reçoit un second identifiant envoyé par le chargeur (S303) ; et si le second identifiant satisfait la première relation convenue, ou est constitué de données obtenues par le décryptage correct des premières données (S304), il est déterminé que le dispositif chargé et le chargeur sont identifiés avec succès (S305). Dans le mode VDM, étant donné que le dispositif chargé et le chargeur ont atteint un consensus sur la configuration d'informations, l'identification précise du chargeur et du dispositif chargé peut être réalisée au moyen du premier identifiant et du second identifiant, garantissant ainsi que le chargeur est couplé au dispositif chargé.
PCT/CN2019/122527 2018-12-29 2019-12-03 Procédé et dispositif de charge WO2020134894A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811641233.4A CN111384737A (zh) 2018-12-29 2018-12-29 一种充电方法和设备
CN201811641233.4 2018-12-29

Publications (1)

Publication Number Publication Date
WO2020134894A1 true WO2020134894A1 (fr) 2020-07-02

Family

ID=71126469

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/122527 WO2020134894A1 (fr) 2018-12-29 2019-12-03 Procédé et dispositif de charge

Country Status (2)

Country Link
CN (1) CN111384737A (fr)
WO (1) WO2020134894A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607505A (zh) * 2013-11-13 2014-02-26 四川长虹电器股份有限公司 可相互验证的手机与其充电器及其工作方法
CN105826965A (zh) * 2015-10-20 2016-08-03 维沃移动通信有限公司 一种充电控制方法、终端及数据传输线
CN105826979A (zh) * 2016-04-27 2016-08-03 乐视控股(北京)有限公司 充电匹配方法、装置、电子设备及pd充电器
US20160226283A1 (en) * 2013-09-27 2016-08-04 Intel Corporation Apparatus and method to change current limit
CN106058967A (zh) * 2016-06-06 2016-10-26 乐视控股(北京)有限公司 充电方法、充电装置及终端设备
CN107622030A (zh) * 2017-08-04 2018-01-23 硅谷数模半导体(北京)有限公司 信息交互方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160226283A1 (en) * 2013-09-27 2016-08-04 Intel Corporation Apparatus and method to change current limit
CN103607505A (zh) * 2013-11-13 2014-02-26 四川长虹电器股份有限公司 可相互验证的手机与其充电器及其工作方法
CN105826965A (zh) * 2015-10-20 2016-08-03 维沃移动通信有限公司 一种充电控制方法、终端及数据传输线
CN105826979A (zh) * 2016-04-27 2016-08-03 乐视控股(北京)有限公司 充电匹配方法、装置、电子设备及pd充电器
CN106058967A (zh) * 2016-06-06 2016-10-26 乐视控股(北京)有限公司 充电方法、充电装置及终端设备
CN107622030A (zh) * 2017-08-04 2018-01-23 硅谷数模半导体(北京)有限公司 信息交互方法和装置

Also Published As

Publication number Publication date
CN111384737A (zh) 2020-07-07

Similar Documents

Publication Publication Date Title
US11451077B2 (en) Electronic equipment, charger and charging method
US8018834B2 (en) Methods and devices for wire-based configuration of wireless devices
WO2018184536A1 (fr) Procédé de transmission de données et dispositif d'extrémité d'envoi
JP4988918B2 (ja) アクセサリデバイスと携帯デバイスとの間の通信方法およびシステム
US20150293514A1 (en) Method and apparatus for determining direction of power delivery
US20140196125A1 (en) Deploying wireless docking as a service
US20100211685A1 (en) Pairing exchange
US9420462B2 (en) Wireless communication apparatus, communication device, wireless communication method, and wireless communication control program
TW201706862A (zh) 用於強化其他裝置之機能的轉接裝置
WO2016074160A1 (fr) Procédé de communication, adaptateur de puissance et borne
CN104080086A (zh) 无线连接建立方法及无线连接建立装置
CN104159259A (zh) 无线通信方法及无线通信装置
JP2024023983A (ja) 通信装置と通信装置のためのコンピュータプログラム
CN115669022A (zh) 电子设备提供基于测距的服务的方法和电子设备
JP6261577B2 (ja) 無線通信装置、無線通信方法、および無線通信制御プログラム
WO2020134894A1 (fr) Procédé et dispositif de charge
WO2023030058A1 (fr) Procédé, appareil et dispositif de commutation de mode pour élément wifi
WO2022143157A1 (fr) Procédé de négociation de clé et et dispositif associé correspondant
CN114615688B (zh) 一种WiFi热点设备与当前接入设备之间近距离自动配置方法
US20180329846A1 (en) Inter-device digital audio
WO2017177362A1 (fr) Mémoire flash configurable sans fil
WO2020054478A1 (fr) Dispositif de communication, procédé de commande de dispositif de communication, et programme
CN111988864A (zh) 基于无线充电设备的数据传输方法及装置
WO2019206426A1 (fr) Chargeur électrique, dispositif de communication sans fil et procédés associés
WO2023246056A1 (fr) Procédé et appareil de connexion de dispositif, et support d'enregistrement et puce

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19905452

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19905452

Country of ref document: EP

Kind code of ref document: A1