WO2021206186A1 - Dispositif de réception de puissance sans fil et dispositif de transmission de puissance sans fil - Google Patents

Dispositif de réception de puissance sans fil et dispositif de transmission de puissance sans fil Download PDF

Info

Publication number
WO2021206186A1
WO2021206186A1 PCT/KR2020/004626 KR2020004626W WO2021206186A1 WO 2021206186 A1 WO2021206186 A1 WO 2021206186A1 KR 2020004626 W KR2020004626 W KR 2020004626W WO 2021206186 A1 WO2021206186 A1 WO 2021206186A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless power
authentication
message
communication
power transmitter
Prior art date
Application number
PCT/KR2020/004626
Other languages
English (en)
Korean (ko)
Inventor
김재휴
최진구
이민수
임진권
Original Assignee
엘지전자 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 엘지전자 주식회사 filed Critical 엘지전자 주식회사
Priority to PCT/KR2020/004626 priority Critical patent/WO2021206186A1/fr
Publication of WO2021206186A1 publication Critical patent/WO2021206186A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J50/00Circuit arrangements or systems for wireless supply or distribution of electric power
    • H02J50/10Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J50/00Circuit arrangements or systems for wireless supply or distribution of electric power
    • H02J50/40Circuit arrangements or systems for wireless supply or distribution of electric power using two or more transmitting or receiving devices
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J50/00Circuit arrangements or systems for wireless supply or distribution of electric power
    • H02J50/80Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices

Definitions

  • the present invention relates to a wireless power receiver and a wireless power transmitter, and more particularly, to a wireless power receiver and a wireless power transmitter that provide an authentication function according to a wireless power consortium (WPC).
  • WPC wireless power consortium
  • the wireless power transmission technology is a technology for wirelessly transferring power between a power source and an electronic device.
  • the wireless power transfer technology enables charging of the battery of a wireless terminal by simply placing a wireless terminal such as a smartphone or tablet on a wireless charging pad, so that it is more efficient than a wired charging environment using a conventional wired charging connector. It can provide excellent mobility, convenience and safety.
  • wireless power transmission technology is used in various fields such as electric vehicles, wearable devices such as Bluetooth earphones and 3D glasses, home appliances, furniture, underground facilities, buildings, medical devices, robots, and leisure. It is attracting attention as it will replace the existing wired power transmission environment.
  • the wireless power transmission method is also referred to as a contactless power transmission method, a no point of contact power transmission method, or a wireless charging method.
  • a wireless power transmission system includes a wireless power transmission device for supplying electrical energy in a wireless power transmission method, and wireless power reception for receiving electrical energy wirelessly supplied from the wireless power transmission device and supplying power to a power receiving device such as a battery cell. It may consist of a device.
  • Wireless power transmission technology includes a method of transmitting power through magnetic coupling, a method of transmitting power through radio frequency (RF), a method of transmitting power through microwaves, and ultrasound
  • the magnetic coupling-based method is again classified into a magnetic induction method and a magnetic resonance method.
  • the magnetic induction method is a method of transmitting energy using a current induced in the receiving coil due to the magnetic field generated by the transmitting coil battery cell according to electromagnetic coupling between the transmitting coil and the receiving coil.
  • the magnetic resonance method is similar to the magnetic induction method in that it uses a magnetic field. However, in the magnetic resonance method, resonance occurs when a specific resonant frequency is applied to the coil of the transmitting side and the coil of the receiving side. It is different from magnetic induction.
  • An object of the present invention is to provide a wireless power receiver for authenticating the wireless power transmitter and a wireless power transmitter for authenticating the wireless power receiver using a trusted third device.
  • a wireless power receiver provides wireless power from the wireless power transmitter by magnetic coupling with the wireless power transmitter at an operating frequency.
  • a power conversion unit configured to receive and communicate with the wireless power transmitter using in-band communication using the operating frequency, and out-band using a frequency other than the operating frequency -band) a communication/control unit for communicating with the wireless power transmitter or a third device using communication, wherein the communication/control unit transmits a message received from the wireless power transmitter to the third device and receives a response message to the message from the third device.
  • a wireless power transmitter provides wireless power from the wireless power receiver by magnetic coupling with the wireless power receiver at an operating frequency.
  • a power conversion unit configured to transmit and communicate with the wireless power receiver using in-band communication using the operating frequency, and out-band using a frequency other than the operating frequency -band) includes a communication/control unit that communicates with the wireless power receiver or a third device using communication, wherein the communication/control unit transmits a message to the wireless power receiver, and Receives a response message to the message from the device.
  • a wireless power receiver provides wireless power from the wireless power transmitter by magnetic coupling with the wireless power transmitter at an operating frequency.
  • a power conversion unit configured to receive and communicate with the wireless power transmitter using in-band communication using the operating frequency, and out-band using a frequency other than the operating frequency -band) a communication/control unit for communicating with the wireless power transmitter or a third device using communication, wherein the communication/control unit is configured to mutually authenticate with the wireless power transmitter from the third device Receive authentication information for
  • the wireless power receiver may authenticate the wireless power transmitter without performing public key operation.
  • the effect according to the present invention is not limited by the contents exemplified above, and more various effects are included in the present specification.
  • FIG. 1 is a block diagram of a wireless power system 10 according to an embodiment.
  • FIG. 2 is a block diagram of a wireless power system 10 according to another embodiment.
  • 3A illustrates an embodiment of various electronic devices to which a wireless power transmission system is introduced.
  • 3B shows an example of WPC NDEF in a wireless power transmission system.
  • 4A is a block diagram of a wireless power transmission system according to another embodiment.
  • 4B is a diagram illustrating an example of a Bluetooth communication architecture to which an embodiment according to the present specification can be applied.
  • 4C is a block diagram illustrating a wireless power transmission system using BLE communication according to an example.
  • 4D is a block diagram illustrating a wireless power transmission system using BLE communication according to another example.
  • 5 is a state transition diagram for explaining a wireless power transmission procedure.
  • FIG. 6 illustrates a power control control method according to an embodiment.
  • FIG. 7 is a block diagram of an apparatus for transmitting power wirelessly according to another embodiment.
  • FIG 8 shows an apparatus for receiving wireless power according to another embodiment.
  • FIG. 9 shows a communication frame structure according to an embodiment.
  • FIG. 10 is a structure of a sync pattern according to an embodiment.
  • FIG. 11 illustrates operating states of a wireless power transmitter and a wireless power receiver in a shared mode according to an embodiment.
  • FIG. 12 is a block diagram illustrating a wireless charging certificate format according to an embodiment.
  • FIG. 13 is a structure of a capability packet of a wireless power transmitter according to an embodiment.
  • FIG. 14 is a configuration packet structure of a wireless power receiver according to an embodiment.
  • 15 illustrates an application-level data stream between a wireless power transmitter and a receiver according to an example.
  • 16 is a flowchart illustrating an authentication method according to an embodiment of the present invention.
  • FIG. 17 is a diagram illustrating a format of an authentication request message (Get_Certificate) according to an example.
  • FIG. 18 is a diagram illustrating a format of a certificate message (Certificate) according to an example.
  • FIG. 19 is a diagram illustrating a format of an authentication request message (Challenge) to be transmitted by the wireless power receiver 400 according to an example.
  • FIG. 20 is a diagram illustrating a format of an authentication response message (Challenge_Auth) according to an example.
  • 21 is a flowchart illustrating an authentication method according to another embodiment of the present invention.
  • 22 is a diagram illustrating a format of an identification information packet of a wireless power transmitter according to an example.
  • 23 is a diagram illustrating authentication requests used by a wireless power receiver.
  • 24 is a flowchart illustrating an authentication method according to another embodiment of the present invention.
  • 25 is a flowchart illustrating an authentication method according to another embodiment of the present invention.
  • 26 is a diagram illustrating a format of an identification information packet of a wireless power receiver according to an example.
  • 27 is a diagram schematically illustrating an authentication method according to another embodiment of the present invention.
  • 28 is a flowchart illustrating a method of generating a symmetric key using a nonce between a wireless power transmitter and a third device.
  • 29 is a diagram illustrating a format of a first mutual authentication response message according to an example.
  • FIG. 30 is a flowchart illustrating a method of generating a symmetric key using a time stamp between a wireless power transmitter and a third device.
  • 31 is a diagram illustrating a format of a mutual authentication request message according to an example.
  • 32 is a flowchart illustrating a method in which a third device transmits a symmetric key to a wireless power receiver.
  • 33 is a flowchart illustrating a method for mutual authentication between the wireless power receiver 400 and the wireless power transmitter 300 using a symmetric key using a nonce.
  • DEL_AUTH_RESP 1 is a diagram illustrating a format of a first delegation authentication response message (DEL_AUTH_RESP 1) according to an example.
  • 35 is a flowchart illustrating a method for mutual authentication between a wireless power receiver and a wireless power transmitter using a symmetric key using a time stamp.
  • 36 is a diagram illustrating a format of a delegation authentication request message (DEL_AUTH_REQ) according to an example.
  • a or B (A or B) may mean “only A”, “only B”, or “both A and B”.
  • a or B (A or B)” in the present specification may be interpreted as “A and/or B (A and/or B)”.
  • A, B or C(A, B or C) herein means “only A”, “only B”, “only C”, or “any and any combination of A, B and C ( any combination of A, B and C)”.
  • a slash (/) or a comma (comma) may mean “and/or”.
  • A/B may mean “A and/or B”. Accordingly, “A/B” may mean “only A”, “only B”, or “both A and B”.
  • A, B, C may mean “A, B, or C”.
  • At least one of A and B may mean “only A”, “only B” or “both A and B”. Also, in the present specification, the expression “at least one of A or B” or “at least one of A and/or B” means “at least one of A and/or B”. It can be interpreted the same as "A and B (at least one of A and B)”.
  • At least one of A, B and C means “only A”, “only B”, “only C”, or “A, B and C” any combination of A, B and C”. Also, “at least one of A, B or C” or “at least one of A, B and/or C” means can mean “at least one of A, B and C”.
  • parentheses used herein may mean “for example”.
  • PDCCH control information
  • PDCCH control information
  • parentheses used herein may mean “for example”.
  • PDCCH control information
  • wireless power refers to any form of electric field, magnetic field, electromagnetic field, etc. transmitted from a wireless power transmitter to a wireless power receiver without the use of physical electromagnetic conductors. It is used to mean the energy of Wireless power may also be called a wireless power signal, and may refer to an oscillating magnetic flux enclosed by a primary coil and a secondary coil. Power conversion in a system is described herein for wirelessly charging devices including, for example, mobile phones, cordless phones, iPods, MP3 players, headsets, and the like.
  • the basic principle of wireless power transmission is, for example, a method of transmitting power through magnetic coupling, a method of transmitting power through a radio frequency (RF), microwave (microwave) ) includes both a method of transmitting power through an ultrasonic wave and a method of transmitting power through an ultrasonic wave.
  • RF radio frequency
  • microwave microwave
  • FIG. 1 is a block diagram of a wireless power system 10 according to an embodiment.
  • a wireless power system 10 includes a wireless power transmitter 100 and a wireless power receiver 200 .
  • the wireless power transmitter 100 receives power from an external power source S to generate a magnetic field.
  • the wireless power receiving apparatus 200 receives power wirelessly by generating a current using the generated magnetic field.
  • the wireless power transmitter 100 and the wireless power receiver 200 may transmit/receive various information required for wireless power transmission.
  • the communication between the wireless power transmitter 100 and the wireless power receiver 200 is in-band communication using a magnetic field used for wireless power transmission or out-band communication using a separate communication carrier.
  • (out-band communication) may be performed according to any one method.
  • Out-band communication may be referred to as out-of-band communication.
  • the terms are unified and described as out-band communication. Examples of out-band communication may include NFC, Bluetooth (bluetooth), BLE (bluetooth low energy), and the like.
  • the wireless power transmitter 100 may be provided as a fixed type or a mobile type.
  • the fixed type include embedded in furniture such as ceilings, walls, or tables indoors, implanted in outdoor parking lots, bus stops, subway stations, etc., or installed in vehicles or trains, etc. There is this.
  • the portable wireless power transmission device 100 may be implemented as a part of another device, such as a portable device having a movable weight or size, or a cover of a notebook computer.
  • the wireless power receiver 200 should be interpreted as a comprehensive concept including various electronic devices including batteries and various home appliances that are driven by receiving power wirelessly instead of a power cable.
  • Representative examples of the wireless power receiver 200 include a mobile terminal, a cellular phone, a smart phone, a personal digital assistant (PDA), and a portable media player (PMP: Portable Media Player), Wibro terminals, tablets, phablets, notebooks, digital cameras, navigation terminals, televisions, electric vehicles (EVs), and the like.
  • FIG. 2 is a block diagram of a wireless power system 10 according to another embodiment.
  • one wireless power transmitter 100 and the wireless power receiver 200 exchange power on a one-to-one basis, but as shown in FIG. 2 , one wireless power transmitter 100 includes a plurality of wireless power receivers. It is also possible to transfer power to (200-1, 200-2,..., 200-M). In particular, in the case of performing wireless power transmission in a magnetic resonance method, one wireless power transmission device 100 applies a simultaneous transmission method or a time division transmission method to a plurality of wireless power reception devices 200-1, 200-2, ...,200-M) can deliver power.
  • FIG. 1 shows a state in which the wireless power transmitter 100 directly transmits power to the wireless power receiver 200
  • the wireless power transmitter 100 and the wireless power receiver 200 are connected wirelessly.
  • a separate wireless power transmission/reception device such as a relay or repeater for increasing the power transmission distance may be provided.
  • power may be transferred from the wireless power transmitter 100 to the wireless power transceiver, and the wireless power transceiver may again transmit power to the wireless power receiver 200 .
  • the wireless power receiver, the power receiver, and the receiver referred to in this specification refer to the wireless power receiving apparatus 200 .
  • the wireless power transmitter, the power transmitter, and the transmitter referred to in this specification refer to the wireless power receiving and transmitting apparatus 100 .
  • 3A illustrates an embodiment of various electronic devices to which a wireless power transmission system is introduced.
  • FIG. 3A shows electronic devices classified according to the amount of power transmitted and received in the wireless power transmission system.
  • wearable devices such as a smart watch, a smart glass, a head mounted display (HMD), and a smart ring and an earphone, a remote control, a smart phone, a PDA, a tablet
  • a low-power (about 5W or less or about 20W or less) wireless charging method may be applied to mobile electronic devices (or portable electronic devices) such as a PC.
  • Medium/small power (about 50W or less or about 200W or less) wireless charging method may be applied to small and medium-sized home appliances such as laptop computers, robot cleaners, TVs, sound devices, vacuum cleaners, and monitors.
  • Kitchen appliances such as blenders, microwave ovens, and electric rice cookers, personal mobility devices (or electronic devices/mobilities) such as wheelchairs, electric kickboards, electric bicycles, and electric vehicles, use high power (about 2 kW or less or 22 kW or less)
  • a wireless charging method may be applied.
  • the electronic devices/mobile means described above may each include a wireless power receiver to be described later. Accordingly, the above-described electronic devices/mobile means may be charged by wirelessly receiving power from the wireless power transmitter.
  • Standards for wireless power transmission include a wireless power consortium (WPC), an air fuel alliance (AFA), and a power matters alliance (PMA).
  • WPC wireless power consortium
  • AFA air fuel alliance
  • PMA power matters alliance
  • the WPC standard defines a baseline power profile (BPP) and an extended power profile (EPP).
  • BPP relates to a wireless power transmitter and receiver supporting 5W power transmission
  • EPP relates to a wireless power transmitter and receiver supporting power transmission in a range greater than 5W and less than 30W.
  • the WPC classifies a wireless power transmitter and a receiver into power class (PC) -1, PC0, PC1, and PC2, and provides standard documents for each PC.
  • PC power class
  • the PC-1 standard relates to a wireless power transmitter and receiver that provide guaranteed power of less than 5W.
  • Applications of PC-1 include wearable devices such as smart watches.
  • the PC0 standard relates to a wireless power transmitter and receiver that provide a guaranteed power of 5W.
  • the PC0 standard includes EPP with guaranteed power up to 30W.
  • in-band (IB) communication is a mandatory communication protocol of PC0
  • out-band (OB) communication used as an optional backup channel may also be used.
  • the wireless power receiver can identify whether OB is supported by setting an OB flag in a configuration packet.
  • the wireless power transmitter supporting the OB may enter the OB handover phase by transmitting a bit-pattern for OB handover as a response to the configuration packet.
  • the response to the configuration packet may be NAK, ND, or a newly defined 8-bit pattern.
  • Applications of PC0 include smartphones.
  • the PC1 standard relates to a wireless power transmitter and receiver that provide guaranteed power of 30W to 150W.
  • the OB is an essential communication channel for PC1, and the IB is used as initialization and link establishment to the OB.
  • the wireless power transmitter may enter the OB handover phase by using a bit pattern for OB handover.
  • Applications of PC1 include laptops and power tools.
  • the PC2 standard relates to a wireless power transmitter and receiver that provide guaranteed power of 200W to 2kW, and its applications include kitchen appliances.
  • PCs may be distinguished according to power levels, and whether to support the same compatibility between PCs may be optional or mandatory.
  • compatibility between identical PCs means that power transmission and reception are possible between identical PCs.
  • compatibility between different PCs may also be supported.
  • compatibility between different PCs means that power transmission/reception is possible even between different PCs.
  • the wireless power transmitter having PC x can charge the wireless power receiver having PC y, it can be seen that compatibility between different PCs is maintained.
  • a wireless power receiver of the lap-top charging method that can stably charge only when power is continuously transmitted is called a wireless power transmitter of the same PC. Even so, there may be a problem in stably receiving power from the wireless power transmitter of the electric tool type that transmits power discontinuously.
  • the wireless power receiver may There is a risk of breakage. As a result, it is difficult for a PC to be an index/standard representing/indicating compatibility.
  • Wireless power transmission and reception devices may provide a very convenient user experience and interface (UX/UI). That is, a smart wireless charging service may be provided.
  • the smart wireless charging service may be implemented based on the UX/UI of a smartphone including a wireless power transmitter. For these applications, the interface between the smartphone's processor and the wireless charging receiver allows "drop and play" bidirectional communication between the wireless power transmitter and the receiver.
  • a user may experience a smart wireless charging service in a hotel.
  • the wireless charger transmits wireless power to the smartphone and the smartphone receives wireless power.
  • the wireless charger transmits information about the smart wireless charging service to the smartphone.
  • the smartphone detects that it is located on the wireless charger, detects the reception of wireless power, or the smartphone receives information about the smart wireless charging service from the wireless charger, the smartphone gives the user consent ( opt-in) is requested.
  • the smartphone may display a message on the screen in such a way that it may or may not contain an alarm sound.
  • An example of the message may include a phrase such as "Welcome to ### hotel.
  • the smartphone receives the user's input for selecting Yes or No Thanks, and performs the following procedure selected by the user. If Yes is selected, the smartphone transmits the corresponding information to the wireless charger. And the smart phone and wireless charger perform the smart charging function together.
  • the smart wireless charging service may also include receiving auto-filled WiFi credentials.
  • the wireless charger transmits the WiFi credentials to the smartphone, and the smartphone automatically enters the WiFi credentials received from the wireless charger by running an appropriate app.
  • the smart wireless charging service may also include running a hotel application that provides hotel promotions, or obtaining remote check-in/check-out and contact information.
  • a user may experience a smart wireless charging service in a vehicle.
  • the wireless charger transmits wireless power to the smartphone, and the smartphone receives wireless power.
  • the wireless charger transmits information about the smart wireless charging service to the smartphone.
  • the smartphone detects that it is located on the wireless charger, detects the reception of wireless power, or the smartphone receives information about the smart wireless charging service from the wireless charger, the smartphone prompts the user to confirm identity. Enter the inquiry state.
  • the smartphone is automatically connected to the car via WiFi and/or Bluetooth.
  • the smartphone may display the message on the screen in a manner that may or may not include an alarm sound.
  • An example of the message may include a phrase such as "Welcome to your car. Select "Yes" to synch device with in-car controls : Yes
  • the smartphone receives the user's input for selecting Yes or No Thanks, and performs the following procedure selected by the user. If Yes is selected, the smartphone transmits the corresponding information to the wireless charger.
  • the smart phone and the wireless charger can perform in-vehicle smart control functions together by driving in-vehicle application/display software. The user can enjoy the desired music, and can check the regular map location.
  • the in-vehicle application/display software may include capabilities to provide synchronized access for passers-by.
  • a user may experience smart wireless charging at home.
  • the wireless charger transmits wireless power to the smartphone and the smartphone receives wireless power.
  • the wireless charger transmits information about the smart wireless charging service to the smartphone.
  • the smartphone detects that it is located on the wireless charger, detects the reception of wireless power, or the smartphone receives information about the smart wireless charging service from the wireless charger, the smartphone gives the user consent ( opt-in) is requested.
  • the smartphone may display a message on the screen in such a way that it may or may not contain an alarm sound.
  • An example of the message may include a phrase such as "Hi xxx, Would you like to activate night mode and secure the building?: Yes
  • the smartphone receives the user's input for selecting Yes or No Thanks, and performs the following procedure selected by the user. If Yes is selected, the smartphone transmits the corresponding information to the wireless charger. Smartphones and wireless chargers can at least recognize the user's pattern and encourage the user to lock doors and windows, turn off lights, or set an alarm.
  • a 'profile' will be newly defined as an index/standard representing/indicating compatibility. That is, it can be interpreted that compatibility is maintained between wireless power transceivers having the same 'profile' and stable power transmission and reception is possible, and power transmission/reception is impossible between wireless power transceivers having different 'profiles'.
  • Profiles may be defined according to application and/or compatibility independent of (or independently of) power class.
  • Profiles can be broadly divided into three categories: i) mobile and computing, ii) power tools, and iii) kitchen.
  • the profile can be largely divided into i) mobile, ii) electric tool, iii) kitchen, and iv) wearable.
  • PC may be defined as PC0 and/or PC1
  • communication protocol/method is IB and OB
  • operating frequency is 87 ⁇ 205kHz
  • examples of applications include smartphones, laptops, etc.
  • the PC may be defined as PC1
  • the communication protocol/method may be IB
  • the operating frequency may be defined as 87 to 145 kHz
  • an electric tool may exist as an example of the application.
  • PC may be defined as PC2
  • communication protocol/method is NFC-based
  • operating frequency is less than 100 kHz
  • examples of applications include kitchen/home appliances.
  • NFC communication can be used between the wireless power transmitter and receiver.
  • WPC NDEF NFC Data Exchange Profile Format
  • the wireless power transmitter and the receiver can confirm that they are NFC devices.
  • 3B shows an example of WPC NDEF in a wireless power transmission system.
  • the WPC NDEF is, for example, an application profile field (eg 1B), a version field (eg 1B), and profile specific data (eg 1B).
  • the application profile field indicates whether the device is i) mobile and computing, ii) powered tools, and iii) kitchen, the upper nibble of the version field indicates the major version and the lower nibble (lower nibble) indicates a minor version.
  • Profile-specific data also defines the content for the kitchen.
  • the PC may be defined as PC-1
  • the communication protocol/method may be IB
  • the operating frequency may be defined as 87 to 205 kHz
  • examples of the application may include a wearable device worn on the user's body.
  • Maintaining compatibility between the same profiles may be essential, and maintaining compatibility between different profiles may be optional.
  • profiles may be generalized and expressed as first to nth profiles, and new profiles may be added/replaced according to WPC standards and embodiments.
  • the wireless power transmitter selectively transmits power only to the wireless power receiver having the same profile as itself, thereby enabling more stable power transmission.
  • the burden on the wireless power transmitter is reduced and power transmission to an incompatible wireless power receiver is not attempted, the risk of damage to the wireless power receiver is reduced.
  • PC1 in the 'mobile' profile can be defined by borrowing optional extensions such as OB based on PC0, and in the case of the 'powered tools' profile, the PC1 'mobile' profile can be defined simply as a modified version.
  • OB optional extensions
  • the wireless power transmitter or the wireless power receiver may inform the other party of its profile through various methods.
  • the AFA standard refers to a wireless power transmitter as a power transmitting circuit (PTU), and a wireless power receiver as a power receiving circuit (PRU), and the PTU is classified into a number of classes as shown in Table 1, and the PRU is classified into a number of categories.
  • PTU power transmitting circuit
  • PRU power receiving circuit
  • PRU PRX_OUT_MAX' Example application Category 1 TBD Bluetooth headset Category 2 3.5W feature phone Category 3 6.5W Smartphone Category 4 13W tablet, leaflet Category 5 25W small form factor laptop Category 6 37.5W regular laptop Category 7 50W Home Appliances
  • the maximum output power capability of the class n PTU is greater than or equal to the PTX_IN_MAX value of the corresponding class.
  • the PRU cannot draw power greater than the power specified in that category.
  • 4A is a block diagram of a wireless power transmission system according to another embodiment.
  • the wireless power transmission system 10 includes a mobile device 450 wirelessly receiving power and a base station 400 wirelessly transmitting power.
  • the base station 400 is a device that provides inductive power or resonant power, and may include at least one wireless power transmitter 100 and a system circuit 405 .
  • the wireless power transmitter 100 may transmit inductive power or resonant power and control the transmission.
  • the wireless power transmitter 100 transmits power to an appropriate level and a power conversion circuit 110 that converts electrical energy into a power signal by generating a magnetic field through a primary coil (s)
  • a communication/control circuit 120 for controlling communication and power transfer with the wireless power receiver 200 may be included.
  • the system circuit 405 may perform input power provisioning, control of a plurality of wireless power transmitters, and other operation control of the base station 400 such as user interface control.
  • the primary coil may generate an electromagnetic field using AC power (or voltage or current).
  • the primary coil may receive AC power (or voltage or current) of a specific frequency output from the power conversion circuit 110 and may generate a magnetic field of a specific frequency accordingly.
  • the magnetic field may be generated non-radiatively or radially, and the wireless power receiving apparatus 200 receives it and generates a current. In other words, the primary coil transmits power wirelessly.
  • the primary coil and the secondary coil may have any suitable shape, for example, a copper wire wound around a high permeability formation such as ferrite or amorphous metal.
  • the primary coil may be referred to as a transmitting coil, a primary core, a primary winding, a primary loop antenna, or the like.
  • the secondary coil may be called a receiving coil, a secondary core, a secondary winding, a secondary loop antenna, a pickup antenna, etc. .
  • the primary coil and the secondary coil may be provided in the form of a primary resonance antenna and a secondary resonance antenna, respectively.
  • the resonant antenna may have a resonant structure including a coil and a capacitor.
  • the resonant frequency of the resonant antenna is determined by the inductance of the coil and the capacitance of the capacitor.
  • the coil may be formed in the form of a loop.
  • a core may be disposed inside the loop.
  • the core may include a physical core such as a ferrite core or an air core.
  • the resonance phenomenon refers to a phenomenon in which, when a near field corresponding to a resonant frequency occurs in one resonant antenna, when other resonant antennas are located around, the two resonant antennas are coupled to each other and high efficiency energy transfer occurs between the resonant antennas. .
  • a magnetic field corresponding to the resonant frequency is generated between the primary resonant antenna and the secondary resonant antenna, a phenomenon occurs in which the primary resonant antenna and the secondary resonant antenna resonate with each other.
  • the magnetic field is focused toward the secondary resonant antenna with higher efficiency compared to the case where the magnetic field is radiated into free space, and thus energy can be transferred from the primary resonant antenna to the secondary resonant antenna with high efficiency.
  • the magnetic induction method may be implemented similarly to the magnetic resonance method, but in this case, the frequency of the magnetic field does not need to be the resonant frequency. Instead, in the magnetic induction method, matching between the loops constituting the primary coil and the secondary coil is required, and the distance between the loops must be very close.
  • the wireless power transmitter 100 may further include a communication antenna.
  • the communication antenna may transmit and receive communication signals using a communication carrier other than magnetic field communication.
  • the communication antenna may transmit and receive communication signals such as Wi-Fi, Bluetooth, Bluetooth LE, ZigBee, and NFC.
  • the communication/control circuit 120 may transmit/receive information to and from the wireless power receiver 200 .
  • the communication/control circuit 120 may include at least one of an IB communication module and an OB communication module.
  • the IB communication module may transmit/receive information using a magnetic wave having a specific frequency as a center frequency.
  • the communication/control circuit 120 performs in-band communication by loading communication information on the operating frequency of wireless power transmission and transmitting it through the primary coil or by receiving the operating frequency containing the information through the primary coil. can do.
  • modulation schemes such as binary phase shift keying (BPSK), frequency shift keying (FSK) or amplitude shift keying (ASK) and Manchester coding or non-zero return level (NZR) -L: non-return-to-zero level
  • BPSK binary phase shift keying
  • FSK frequency shift keying
  • ASK amplitude shift keying
  • NZR non-zero return level
  • the communication/control circuit 120 may transmit/receive information up to a distance of several meters at a data rate of several kbps.
  • the OB communication module may perform out-band communication through a communication antenna.
  • the communication/control circuit 120 may be provided as a short-range communication module.
  • Examples of the short-range communication module include communication modules such as Wi-Fi, Bluetooth, Bluetooth LE, ZigBee, and NFC.
  • the communication/control circuit 120 may control the overall operation of the wireless power transmitter 100 .
  • the communication/control circuit 120 may perform calculation and processing of various types of information, and may control each component of the wireless power transmission apparatus 100 .
  • the communication/control circuit 120 may be implemented in a computer or a similar device using hardware, software, or a combination thereof.
  • the communication/control circuit 120 may be provided in the form of an electronic circuit that processes electrical signals to perform a control function, and in software, in the form of a program that drives the communication/control circuit 120 in hardware. may be provided.
  • the communication/control circuit 120 may control the transmit power by controlling an operating point.
  • the operating point to be controlled may correspond to a combination of frequency (or phase), duty cycle, duty ratio, and voltage amplitude.
  • the communication/control circuit 120 may control the transmission power by adjusting at least one of a frequency (or phase), a duty cycle, a duty ratio, and a voltage amplitude.
  • the wireless power transmitter 100 may supply constant power
  • the wireless power receiver 200 may control the received power by controlling the resonance frequency.
  • the mobile device 450 receives and stores the power received from the wireless power receiver 200 and the wireless power receiver 200 for receiving wireless power through a secondary coil, and stores the power. Includes a load (load, 455) to supply to.
  • the wireless power receiver 200 may include a power pick-up circuit 210 and a communication/control circuit 220 .
  • the power pickup circuit 210 may receive wireless power through the secondary coil and convert it into electrical energy.
  • the power pickup circuit 210 rectifies the AC signal obtained through the secondary coil and converts it into a DC signal.
  • the communication/control circuit 220 may control transmission and reception of wireless power (transmission and reception of power).
  • the secondary coil may receive wireless power transmitted from the wireless power transmitter 100 .
  • the secondary coil may receive power using a magnetic field generated in the primary coil.
  • the specific frequency is the resonance frequency
  • a magnetic resonance phenomenon occurs between the primary coil and the secondary coil, so that power can be more efficiently transmitted.
  • the communication/control circuit 220 may further include a communication antenna.
  • the communication antenna may transmit and receive communication signals using a communication carrier other than magnetic field communication.
  • the communication antenna may transmit/receive communication signals such as Wi-Fi, Bluetooth, Bluetooth LE, ZigBee, and NFC.
  • the communication/control circuit 220 may transmit/receive information to and from the wireless power transmitter 100 .
  • the communication/control circuit 220 may include at least one of an IB communication module and an OB communication module.
  • the IB communication module may transmit/receive information using a magnetic wave having a specific frequency as a center frequency.
  • the communication/control circuit 220 may perform IB communication by loading information on a magnetic wave and transmitting it through a secondary coil or by receiving a magnetic wave containing information through a secondary coil.
  • modulation schemes such as binary phase shift keying (BPSK), frequency shift keying (FSK) or amplitude shift keying (ASK) and Manchester coding or non-zero return level (NZR) -L: non-return-to-zero level
  • BPSK binary phase shift keying
  • FSK frequency shift keying
  • ASK amplitude shift keying
  • NZR non-zero return level
  • the communication/control circuit 220 may transmit/receive information up to a distance of several meters at a data rate of several kbps.
  • the OB communication module may perform out-band communication through a communication antenna.
  • the communication/control circuit 220 may be provided as a short-range communication module.
  • Examples of the short-range communication module include communication modules such as Wi-Fi, Bluetooth, Bluetooth LE, ZigBee, and NFC.
  • the communication/control circuit 220 may control the overall operation of the wireless power receiver 200 .
  • the communication/control circuit 220 may perform calculation and processing of various types of information, and may control each component of the wireless power receiver 200 .
  • the communication/control circuit 220 may be implemented as a computer or a similar device using hardware, software, or a combination thereof.
  • the communication/control circuit 220 may be provided in the form of an electronic circuit that processes electrical signals to perform a control function, and in software, in the form of a program for driving the communication/control circuit 220 in hardware. may be provided.
  • the communication/control circuit 120 and the communication/control circuit 220 are Bluetooth or Bluetooth LE as an OB communication module or a short-range communication module
  • the communication/control circuit 120 and the communication/control circuit 220 are respectively shown in FIG. 4B It can be implemented and operated with the same communication architecture as
  • 4B is a diagram illustrating an example of a Bluetooth communication architecture to which an embodiment according to the present specification can be applied.
  • FIG. 4b shows an example of a protocol stack of Bluetooth BR (Basic Rate)/EDR (Enhanced Data Rate) supporting GATT, (b) is Bluetooth LE (Low Energy) An example of a protocol stack is shown.
  • Bluetooth BR Basic Rate
  • EDR Enhanced Data Rate
  • GATT GATT
  • Bluetooth LE Low Energy
  • the Bluetooth BR/EDR protocol stack includes an upper controller stack (Controller stack, 460) and a lower one based on the host controller interface (HCI, 18). It may include a host stack (Host Stack, 470).
  • the host stack (or host module) 470 refers to a wireless transceiver module that receives a Bluetooth signal of 2.4 GHz and hardware for transmitting or receiving Bluetooth packets, and the controller stack 460 is connected to the Bluetooth module to configure the Bluetooth module. control and perform actions.
  • the host stack 470 may include a BR/EDR PHY layer 12 , a BR/EDR baseband layer 14 , and a link manager layer 16 .
  • the BR/EDR PHY layer 12 is a layer that transmits and receives a 2.4 GHz radio signal.
  • GFSK Gausian Frequency Shift Keying
  • the BR/EDR baseband layer 14 is responsible for transmitting a digital signal, selects a channel sequence hopping 1400 times per second, and transmits a 625us-long time slot for each channel.
  • the link manager layer 16 controls the overall operation (link setup, control, security) of the Bluetooth connection by using LMP (Link Manager Protocol).
  • LMP Link Manager Protocol
  • the link manager layer 16 may perform the following functions.
  • the host controller interface layer 18 provides an interface between the host module and the controller module so that the host provides commands and data to the controller, and the controller provides events and data to the host.
  • the host stack (or host module, 20) is a logical link control and adaptation protocol (L2CAP, 21), an attribute protocol (Protocol, 22), a generic attribute profile (Generic Attribute Profile, GATT, 23), a generic access profile (Generic Access) Profile, GAP, 24) and BR/EDR profile (25).
  • L2CAP logical link control and adaptation protocol
  • GATT attribute protocol
  • GAP Generic Access Profile
  • BR/EDR profile BR/EDR profile
  • the logical link control and adaptation protocol may provide one bidirectional channel for data transmission to a specific protocol or profile file.
  • the L2CAP 21 may multiplex various protocols, profiles, etc. provided by the Bluetooth upper layer.
  • L2CAP of Bluetooth BR/EDR uses dynamic channels, supports protocol service multiplexer, retransmission, and streaming mode, and provides segmentation and reassembly, per-channel flow control, and error control.
  • the generic attribute profile (GATT) 23 may be operable as a protocol describing how the attribute protocol 22 is used in the configuration of services.
  • the generic attribute profile 23 may be operable to define how ATT attributes are grouped together into services, and may be operable to describe characteristics associated with services.
  • the generic attribute profile 23 and the attribute protocol (ATT) 22 can use features to describe the state and services of a device, how they relate to each other and how they are used.
  • the attribute protocol 22 and the BR/EDR profile 25 define a service (profile) using Bluetooth BR/EDR and an application protocol for sending and receiving these data, and the Generic Access Profile , GAP, 24) define device discovery, connectivity, and security levels.
  • the Bluetooth LE protocol stack includes a controller stack 480 operable to process a timing-critical wireless device interface and a host stack operable to process high level data. (Host stack, 490).
  • the controller stack 480 may be implemented using a communication module that may include a Bluetooth radio, for example, a processor module that may include a processing device such as a microprocessor.
  • the host stack 490 may be implemented as part of an OS running on a processor module, or as an instantiation of a package on the OS.
  • controller stack and host stack may operate or run on the same processing device within a processor module.
  • the controller stack 480 includes a physical layer (PHY) 32, a link layer (Link Layer) 34, and a host controller interface (Host Controller Interface, 36).
  • PHY physical layer
  • Link Layer Link Layer
  • Hos Controller Interface 36
  • the physical layer (PHY, radio transmit/receive module, 32) is a layer for transmitting and receiving a 2.4 GHz radio signal, and uses Gaussian Frequency Shift Keying (GFSK) modulation and a frequency hopping technique composed of 40 RF channels.
  • GFSK Gaussian Frequency Shift Keying
  • the link layer 34 which transmits or receives Bluetooth packets, performs advertising and scanning functions using three advertising channels, and then creates a connection between devices, and a maximum of 257 bytes of data packets through 37 data channels. Provides a function to send and receive
  • the host stack includes a Generic Access Profile (GAP, 40), a Logical Link Control and Adaptation Protocol (L2CAP, 41), a Security Manager (SM, 42), an Attribute Protocol (ATT, 440), and a Generic Attribute Profile.
  • GAP Generic Access Profile
  • L2CAP Logical Link Control and Adaptation Protocol
  • SM Security Manager
  • ATT Attribute Protocol
  • GATT Generic Attribute Profile
  • GATT Generic Access Profile
  • 25 may include the LT profile (46).
  • the host stack 490 is not limited thereto and may include various protocols and profiles.
  • the host stack uses L2CAP to multiplex various protocols and profiles provided by the Bluetooth upper layer.
  • L2CAP Logical Link Control and Adaptation Protocol, 41
  • L2CAP may provide one bidirectional channel for data transmission to a specific protocol or profile.
  • the L2CAP 41 may be operable to multiplex data between higher layer protocols, segment and reassemble packages, and manage multicast data transmission.
  • Bluetooth LE 3 fixed channels (1 for signaling CH, 1 for Security Manager, 1 for Attribute protocol) are basically used. And, if necessary, a dynamic channel may be used.
  • BR/EDR Base Rate/Enhanced Data Rate
  • a dynamic channel is basically used, and protocol service multiplexer, retransmission, streaming mode, etc. are supported.
  • SM Security Manager
  • ATT Attribute Protocol, 43
  • ATT has the following 6 message types (Request, Response, Command, Notification, Indication, Confirmation).
  • the Request message is a message for requesting and delivering specific information from the client device to the server device
  • the Response message is a response message to the Request message, a message that can be used for transmission from the server device to the client device.
  • Command message A message transmitted mainly from the client device to the server device to instruct a command of a specific operation.
  • the server device does not transmit a response to the command message to the client device.
  • Notification message A message sent from the server device to the client device for notification such as an event.
  • the client device does not send a confirmation message for the Notification message to the server device.
  • Indication and Confirm message A message transmitted from the server device to the client device for notification such as an event. Unlike the Notification message, the client device transmits a confirmation message for the Indication message to the server device.
  • This specification transmits a value for the data length when requesting long data in the GATT profile using the attribute protocol (ATT, 43), so that the client can clearly know the data length, and uses the UUID to obtain a characteristic (Characteristic) from the server value can be sent.
  • ATT attribute protocol
  • the general access profile (GAP, 45) is a newly implemented layer for Bluetooth LE technology, and is used to control role selection and multi-profile operation for communication between Bluetooth LE devices.
  • the general access profile 45 is mainly used for device discovery, connection creation, and security procedures, defines a method for providing information to a user, and defines the following attribute types.
  • UUID Universal Unique Identifier, value type
  • the LE profile 46 is mainly applied to Bluetooth LE devices as profiles that depend on GATT.
  • the LE profile 46 may include, for example, Battery, Time, FindMe, Proximity, and Time, and the specific contents of GATT-based Profiles are as follows.
  • the generic attribute profile (GATT) 44 may be operable as a protocol describing how the attribute protocol 43 is used in the configuration of services.
  • the generic attribute profile 44 may be operable to define how ATT attributes are grouped together into services, and may be operable to describe characteristics associated with services.
  • the generic attribute profile 44 and the attribute protocol (ATT) 43 can use features to describe the state and services of a device, how they relate to each other and how they are used.
  • the BLE procedure may be divided into a device filtering procedure, an advertising procedure, a scanning procedure, a discovery procedure, a connecting procedure, and the like.
  • the device filtering procedure is a method for reducing the number of devices that respond to requests, instructions, and notifications in the controller stack.
  • the controller stack can reduce the number of requests it transmits, thereby reducing power consumption in the BLE controller stack.
  • An advertising device or a scanning device may perform the device filtering procedure to restrict devices receiving an advertisement packet, a scan request, or a connection request.
  • the advertisement device refers to a device that transmits an advertisement event, that is, performs advertisement, and is also expressed as an advertiser.
  • the scanning device refers to a device that performs scanning and a device that transmits a scan request.
  • a scanning device when a scanning device receives some advertisement packets from an advertisement device, the scanning device has to send a scan request to the advertisement device.
  • the scanning device may ignore advertisement packets transmitted from the advertisement device.
  • a device filtering procedure may also be used in the connection request process. If device filtering is used in the connection request process, it is not necessary to transmit a response to the connection request by ignoring the connection request.
  • the advertising device performs an advertising procedure to perform a non-directional broadcast to devices in the area.
  • undirected advertising is advertising directed to all (all) devices rather than a broadcast directed to a specific device, and all devices scan advertisements to request additional information or You can make a connection request.
  • a device designated as a receiving device scans the advertisement to request additional information or a connection request.
  • An advertisement procedure is used to establish a Bluetooth connection with a nearby initiating device.
  • the advertisement procedure may be used to provide periodic broadcast of user data to scanning devices that are listening on the advertisement channel.
  • Advertising devices may receive a scan request from listening devices that are listening to obtain additional user data from the advertising device.
  • the advertisement device transmits a response to the scan request to the device that transmitted the scan request through the same advertisement physical channel as the advertisement physical channel on which the scan request is received.
  • Broadcast user data sent as part of advertisement packets is dynamic data, whereas scan response data is generally static data.
  • An advertising device may receive a connection request from an initiating device on an advertising (broadcast) physical channel. If the advertising device uses a connectable advertising event and the initiating device is not filtered by the device filtering procedure, the advertising device stops advertising and enters a connected mode. The advertising device may start advertising again after the connected mode.
  • a device performing scanning that is, a scanning device, performs a scanning procedure to listen to a non-directional broadcast of user data from advertisement devices using an advertisement physical channel.
  • the scanning device sends a scan request to the advertisement device through an advertisement physical channel to request additional data from the advertisement device.
  • the advertisement device transmits a scan response that is a response to the scan request including additional data requested by the scanning device through the advertisement physical channel.
  • the scanning procedure may be used while being connected to another BLE device in the BLE piconet.
  • the scanning device If the scanning device is in an initiator mode that can receive a broadcast advertisement event and initiate a connection request, the scanning device sends a connection request to the advertisement device through an advertisement physical channel. You can start a Bluetooth connection with
  • the scanning device When the scanning device sends a connection request to the advertising device, the scanning device stops scanning initiator mode for additional broadcast, and enters the connected mode.
  • 'Bluetooth devices' Devices capable of Bluetooth communication (hereinafter, referred to as 'Bluetooth devices') perform advertisement procedures and scanning procedures to discover nearby devices or to be discovered by other devices within a given area.
  • the discovery procedure is performed asymmetrically.
  • a Bluetooth device that tries to find other nearby devices is called a discovering device and listens to find devices that advertise a scannable advertisement event.
  • a Bluetooth device discovered and available from other devices is called a discoverable device and actively broadcasts an advertisement event so that other devices can scan it through an advertisement (broadcast) physical channel.
  • Both the discovering device and the discoverable device may be already connected to other Bluetooth devices in the piconet.
  • connection procedure is asymmetric, and the connection procedure requires a specific Bluetooth device to perform a scanning procedure while another Bluetooth device performs an advertisement procedure.
  • an advertisement procedure may be targeted, as a result of which only one device will respond to the advertisement.
  • a connection After receiving an accessible advertisement event from an advertisement device, a connection may be initiated by sending a connection request to the advertisement device through an advertisement (broadcast) physical channel.
  • the link layer enters the advertisement state by the instruction of the host (stack).
  • the link layer sends advertisement packet data circuits (PDUs) in advertisement events.
  • PDUs advertisement packet data circuits
  • Each advertisement event consists of at least one advertisement PDU, and the advertisement PDUs are transmitted through used advertisement channel indexes.
  • the advertisement event may be terminated earlier when the advertisement PDU is transmitted through the used advertisement channel indexes, or when the advertisement device needs to secure a space for performing other functions.
  • the link layer enters the scanning state under the direction of the host (stack). In the scanning state, the link layer listens for advertisement channel indices.
  • each scanning type is determined by a host.
  • a separate time or advertisement channel index for performing scanning is not defined.
  • the link layer listens for the advertisement channel index during the scanWindow duration.
  • the scanInterval is defined as the interval (interval) between the starting points of two consecutive scan windows.
  • the link layer must listen for completion of all scan intervals in the scan window as directed by the host, provided there is no scheduling conflict. In each scan window, the link layer must scan a different advertising channel index. The link layer uses all available advertising channel indices.
  • the link layer In passive scanning, the link layer only receives packets and transmits no packets.
  • the link layer When active scanning, the link layer performs listening depending on the advertisement PDU type, which may request advertisement PDUs and additional information related to the advertisement device from the advertisement device.
  • the link layer enters the initiation state by the instruction of the host (stack).
  • the link layer When the link layer is in the initiating state, the link layer performs listening for advertisement channel indices.
  • the link layer listens for the advertisement channel index during the scan window period.
  • the link layer enters the connected state when the device making the connection request, that is, the initiating device sends a CONNECT_REQ PDU to the advertising device, or when the advertising device receives the CONNECT_REQ PDU from the initiating device.
  • connection After entering the connected state, a connection is considered to be created. However, the connection need not be considered to be established when it enters the connected state. The only difference between the newly created connection and the established connection is the link layer connection supervision timeout value.
  • the link layer performing the master role is called a master, and the link layer performing the slave role is called a slave.
  • the master controls the timing of the connection event, and the connection event refers to the synchronization point between the master and the slave.
  • BLE devices use packets defined below.
  • the Link Layer has only one packet format used for both advertisement channel packets and data channel packets.
  • Each packet consists of four fields: a preamble, an access address, a PDU, and a CRC.
  • the PDU When one packet is transmitted in the advertisement channel, the PDU will be the advertisement channel PDU, and when one packet is transmitted in the data channel, the PDU will be the data channel PDU.
  • the advertisement channel PDU Packet Data Circuit
  • PDU Packet Data Circuit
  • the PDU type field of the advertisement channel PDU included in the header indicates the PDU type as defined in Table 3 below.
  • advertisement channel PDU types are called advertisement PDUs and are used in specific events.
  • ADV_IND Linkable non-directional advertising event
  • ADV_DIRECT_IND Linkable direct advertising event
  • ADV_NONCONN_IND Non-Linkable Non-Directional Advertising Event
  • ADV_SCAN_IND Scannable non-directional advertising event
  • the PDUs are transmitted in the link layer in the advertisement state and are received by the link layer in the scanning state or initiating state.
  • advertisement channel PDU types are called scanning PDUs and are used in the state described below.
  • SCAN_REQ Sent by the link layer in the scanning state, and received by the link layer in the advertisement state.
  • SCAN_RSP Sent by the link layer in the advertisement state, and received by the link layer in the scanning state.
  • initiation PDUs The following advertisement channel PDU types are called initiation PDUs.
  • CONNECT_REQ Sent by the link layer in the initiating state, and received by the link layer in the advertising state.
  • the data channel PDU has a 16-bit header, payloads of various sizes, and may include a Message Integrity Check (MIC) field.
  • MIC Message Integrity Check
  • the load 455 may be a battery.
  • the battery may store energy using power output from the power pickup circuit 210 .
  • the battery is not necessarily included in the mobile device 450 .
  • the battery may be provided as a detachable external configuration.
  • the wireless power receiving apparatus 200 may include a driving means for driving various operations of the electronic device instead of a battery.
  • the mobile device 450 is shown to include the wireless power receiver 200 and the base station 400 is shown to include the wireless power transmitter 100, in a broad sense, the wireless power receiver ( 200 may be identified with the mobile device 450 , and the wireless power transmitter 100 may be identified with the base station 400 .
  • wireless power transmission including the communication/control circuit 120 may be represented by a simplified block diagram as shown in FIG. 4C .
  • 4C is a block diagram illustrating a wireless power transmission system using BLE communication according to an example.
  • the wireless power transmitter 100 includes a power conversion circuit 110 and a communication/control circuit 120 .
  • the communication/control circuit 120 includes an in-band communication module 121 and a BLE communication module 122 .
  • the wireless power receiver 200 includes a power pickup circuit 210 and a communication/control circuit 220 .
  • the communication/control circuit 220 includes an in-band communication module 221 and a BLE communication module 222 .
  • the BLE communication modules 122 , 222 perform the architecture and operation according to FIG. 4B .
  • the BLE communication modules 122 and 222 may be used to establish a connection between the wireless power transmitter 100 and the wireless power receiver 200, and to exchange control information and packets necessary for wireless power transmission. have.
  • the communication/control circuit 120 may be configured to operate a profile for wireless charging.
  • the profile for wireless charging may be GATT using BLE transmission.
  • 4D is a block diagram illustrating a wireless power transmission system using BLE communication according to another example.
  • the communication/control circuits 120 and 220 include only in-band communication modules 121 and 221, respectively, and the BLE communication modules 122 and 222 include the communication/control circuits 120, 220) and a form separately provided is also possible.
  • a coil or a coil unit may be referred to as a coil assembly, a coil cell, or a cell including a coil and at least one element adjacent to the coil.
  • 5 is a state transition diagram for explaining a wireless power transmission procedure.
  • the power transmission from the wireless power transmitter to the receiver is largely a selection phase (selection phase, 510), a ping phase (ping phase, 520), identification and configuration phase (identification) and configuration phase 530), a negotiation phase 540, a calibration phase 550, a power transfer phase 560, and a renegotiation phase 570.
  • the selection step 510 transitions when a specific error or a specific event is detected while initiating or maintaining the power transmission - including, for example, reference numerals S502, S504, S508, S510 and S512.
  • the wireless power transmitter may monitor whether an object is present on the interface surface. If the wireless power transmitter detects that an object is placed on the interface surface, the process may shift to the ping step 520 .
  • the wireless power transmitter transmits an analog ping signal that is a power signal (or pulse) corresponding to a very short duration, and the current of the transmitting coil or the primary coil Based on the change, it is possible to detect whether an object is present in an active area of the interface surface.
  • the wireless power transmitter may measure a quality factor of a wireless power resonance circuit (eg, a power transmission coil and/or a resonance capacitor).
  • a quality factor may be measured to determine whether the wireless power receiver is placed in the charging area together with the foreign material.
  • an inductance and/or a series resistance component in the coil may be reduced due to an environmental change, thereby reducing a quality factor value.
  • the wireless power transmitter may receive a pre-measured reference quality factor value from the wireless power receiver in a state where the foreign material is not disposed in the charging area.
  • the presence of foreign substances may be determined by comparing the reference quality factor value received in the negotiation step 540 with the measured quality factor value.
  • a specific wireless power receiver may have a low reference quality factor value depending on the type, use, and characteristics of the wireless power receiver - and foreign matter is present. In this case, since there is no significant difference between the measured quality factor value and the reference quality factor value, it may be difficult to determine the presence of foreign substances. Therefore, it is necessary to further consider other determining factors or to determine the presence of foreign substances using other methods.
  • a quality factor value may be measured in a specific frequency domain (eg operating frequency domain) in order to determine whether the object is disposed with the foreign material in the charging area.
  • a specific frequency domain eg operating frequency domain
  • the inductance and/or the series resistance component in the coil may be reduced by environmental changes, and thus the resonant frequency of the coil of the wireless power transmitter may be changed (shifted). That is, the quality factor peak frequency, which is the frequency at which the maximum quality factor value within the operating frequency band is measured, may be moved.
  • step 520 when an object is detected, the wireless power transmitter activates the receiver and transmits a digital ping for identifying whether the detected object is a wireless power receiver. If the wireless power transmitter does not receive a response signal to the digital ping (eg, a signal strength packet) from the receiver in the ping step 520 , the wireless power transmitter may transition back to the selection step 510 . In addition, when the wireless power transmitter receives a signal indicating that power transmission is completed from the receiver in the ping step 520 , that is, a charging complete packet, it may transition to the selection step 510 .
  • a signal indicating that power transmission is completed from the receiver in the ping step 520 that is, a charging complete packet
  • the wireless power transmitter may transition to the identification and configuration step 530 for identifying the receiver and collecting receiver configuration and state information.
  • the wireless power transmitter receives an undesired packet (unexpected packet), or a desired packet is not received for a predefined time (time out), or there is a packet transmission error (transmission error), If a power transfer contract is not established (no power transfer contract), a transition may be made to the selection step 510 .
  • the wireless power transmitter may determine whether it is necessary to enter the negotiation step 540 based on the negotiation field value of the configuration packet received in the identification and configuration step 530 . As a result of the check, if negotiation is necessary, the wireless power transmitter may enter a negotiation step 540 to perform a predetermined FOD detection procedure. On the other hand, as a result of the check, if negotiation is not required, the wireless power transmitter may directly enter the power transmission step 560 .
  • the wireless power transmitter may receive a Foreign Object Detection (FOD) status packet including a reference quality factor value.
  • FOD status packet including the reference peak frequency value may be received.
  • a status packet including a reference quality factor value and a reference peak frequency value may be received.
  • the wireless power transmitter may determine a quality factor threshold for FO detection based on the reference quality factor value.
  • the wireless power transmitter may determine a peak frequency threshold for FO detection based on a reference peak frequency value.
  • the wireless power transmitter can detect whether FO is present in the charging area using the determined quality factor threshold for FO detection and the currently measured quality factor value (quality factor value measured before the ping step), Power transmission can be controlled accordingly. For example, when the FO is detected, power transmission may be stopped, but is not limited thereto.
  • the wireless power transmitter can detect whether FO is present in the charging area using the determined peak frequency threshold for FO detection and the currently measured peak frequency value (the peak frequency value measured before the ping step), and the FO detection result is Power transmission can be controlled accordingly. For example, when the FO is detected, power transmission may be stopped, but is not limited thereto.
  • the wireless power transmitter may return to the selection step 510 .
  • the wireless power transmitter may enter the power transfer step 560 through the correction step 550 .
  • the wireless power transmitter determines the strength of power received at the receiving end in the correction step 550, and the receiving end and the receiving end to determine the intensity of power transmitted from the transmitting end. Power loss at the transmitter can be measured. That is, the wireless power transmitter may predict power loss based on the difference between the transmit power of the transmitter and the receive power of the receiver in the correction step 550 .
  • the wireless power transmitter may correct the threshold for FOD detection by reflecting the predicted power loss.
  • the wireless power transmitter receives an unwanted packet (unexpected packet), a desired packet is not received for a predefined time (time out), or a violation of a preset power transmission contract occurs Otherwise (power transfer contract violation) or when charging is completed, the process may shift to the selection step 510 .
  • the wireless power transmitter may transition to the renegotiation step 570 when it is necessary to reconfigure the power transmission contract according to a change in the state of the wireless power transmitter. At this time, when the renegotiation is normally completed, the wireless power transmitter may return to the power transmission step 560 .
  • the calibration step 550 may be integrated into the power transmission step 560. In this case, in the calibration step 550, Operations may be performed in a power transfer step 560 .
  • the power transmission contract may be established based on the state and characteristic information of the wireless power transmitter and the receiver.
  • the wireless power transmitter state information may include information on the maximum transmittable power amount, information on the maximum acceptable number of receivers, and the like
  • the receiver state information may include information on required power and the like.
  • FIG. 6 illustrates a power control control method according to an embodiment.
  • the wireless power transmitter 100 and the wireless power receiver 200 may control the amount of transmitted power by performing communication together with power transmission/reception.
  • the wireless power transmitter and the wireless power receiver operate at a specific control point.
  • the control point represents a combination of voltage and current provided from an output of the wireless power receiver when power transfer is performed.
  • the wireless power receiver selects a desired control point - a desired output current/voltage, a temperature at a specific location of the mobile device, and additionally an actual control point currently operating. ) to determine
  • the wireless power receiver may calculate a control error value using a desired control point and an actual control point, and transmit it as a control error packet to the wireless power transmitter.
  • the wireless power transmitter may control power transfer by setting/controlling a new operating point - amplitude, frequency, and duty cycle - using the received control error packet. Therefore, the control error packet is transmitted/received at regular time intervals in the strategy delivery step, and as an embodiment, the wireless power receiver sets the control error value to a negative number when trying to reduce the current of the wireless power transmitter, and a control error when trying to increase the current. It can be sent by setting the value to a positive number. As described above, in the induction mode, the wireless power receiver can control power transfer by transmitting a control error packet to the wireless power transmitter.
  • the resonance mode which will be described below, may operate in a different manner from that in the induction mode.
  • one wireless power transmitter In the resonance mode, one wireless power transmitter must be able to simultaneously serve a plurality of wireless power receivers.
  • the wireless power transmitter transmits basic power in common, and the wireless power receiver attempts to control the amount of power received by controlling its own resonance frequency.
  • the method described with reference to FIG. 6 is not completely excluded even in the resonance mode operation, and additional transmission power control may be performed by the method of FIG. 6 .
  • the 7 is a block diagram of an apparatus for transmitting power wirelessly according to another embodiment. This may belong to a wireless power transmission system of a magnetic resonance method or a shared mode.
  • the shared mode may refer to a mode in which one-to-many communication and charging are performed between the wireless power transmitter and the wireless power receiver.
  • the shared mode may be implemented in a magnetic induction method or a resonance method.
  • the wireless power transmitter 700 includes a cover 720 covering the coil assembly, a power adapter 730 for supplying power to the power transmitter 740 , a power transmitter 740 for wirelessly transmitting power, or at least one of a user interface 750 providing power transfer progress and other related information.
  • the user interface 750 may be optionally included or may be included as another user interface 750 of the wireless power transmitter 700 .
  • the power transmitter 740 may include at least one of a coil assembly 760 , an impedance matching circuit 770 , an inverter 780 , a communication circuit 790 , and a control circuit 710 .
  • the coil assembly 760 includes at least one primary coil that generates a magnetic field, and may be referred to as a coil cell.
  • the impedance matching circuit 770 may provide impedance matching between the inverter and the primary coil(s).
  • the impedance matching circuit 770 may generate a resonance at a suitable frequency to boost the primary coil current.
  • the impedance matching circuitry in the multi-coil power transmitter 740 may further include a multiplex to route the signal from the inverter to a subset of the primary coils.
  • the impedance matching circuit may be referred to as a tank circuit.
  • the impedance matching circuit 770 may include a capacitor, an inductor, and a switching element for switching a connection thereof. Impedance matching detects a reflected wave of wireless power transmitted through the coil assembly 760, and switches a switching element based on the detected reflected wave to adjust the connection state of the capacitor or inductor, adjust the capacitance of the capacitor, or adjust the inductance of the inductor This can be done by adjusting.
  • the impedance matching circuit 770 may be omitted, and this specification also includes an embodiment of the wireless power transmitter 700 in which the impedance matching circuit 770 is omitted.
  • Inverter 780 may convert a DC input to an AC signal. Inverter 780 may be driven half-bridge or full-bridge to generate pulse waves of adjustable frequency and duty cycle. The inverter may also include a plurality of stages to adjust the input voltage level.
  • the communication circuit 790 may communicate with the power receiver.
  • the power receiver performs load modulation to communicate requests and information to the power transmitter.
  • the power transmitter 740 may monitor the amplitude and/or phase of the current and/or voltage of the primary coil to demodulate the data transmitted by the power receiver using the communication circuit 790 .
  • the power transmitter 740 may control the output power to transmit data using a frequency shift keying (FSK) method or the like through the communication circuit 790 .
  • FSK frequency shift keying
  • the control circuit 710 may control communication and power transmission of the power transmitter 740 .
  • the control circuit 710 may control power transmission by adjusting the above-described operating point.
  • the operating point may be determined by, for example, at least one of an operating frequency, a duty cycle, and an input voltage.
  • the communication circuit 790 and the control circuit 710 may be provided as separate circuits/devices/chipsets or as one circuit/device/chipsets.
  • FIG. 8 shows an apparatus for receiving wireless power according to another embodiment. This may belong to a wireless power transmission system of a magnetic resonance method or a shared mode.
  • a wireless power receiving device 800 includes a user interface 820 that provides power transfer progress and other related information, a power receiver 830 that receives wireless power, a load circuit 840 or a coil assembly. It may include at least one of the base 850 to support and cover. In particular, the user interface 820 may be optionally included or may be included as another user interface 82 of the power receiving equipment.
  • the power receiver 830 may include at least one of a power converter 860 , an impedance matching circuit 870 , a coil assembly 880 , a communication circuit 890 , and a control circuit 810 .
  • the power converter 860 may convert AC power received from the secondary coil into a voltage and current suitable for the load circuit.
  • the power converter 860 may include a rectifier.
  • the rectifier may rectify the received wireless power and convert it from AC to DC.
  • a rectifier may convert alternating current to direct current using a diode or a transistor, and smooth it using a capacitor and a resistor.
  • As the rectifier a full-wave rectifier, a half-wave rectifier, a voltage multiplier, etc. implemented as a bridge circuit or the like may be used. Additionally, the power converter may adapt the reflected impedance of the power receiver.
  • the impedance matching circuit 870 may provide impedance matching between the combination of the power converter 860 and the load circuit 840 and the secondary coil. As an embodiment, the impedance matching circuit may generate a resonance near 100 kHz that may enhance power transfer.
  • the impedance matching circuit 870 may include a capacitor, an inductor, and a switching element for switching a combination thereof. Impedance matching may be performed by controlling a switching element of a circuit constituting the impedance matching circuit 870 based on a voltage value, a current value, a power value, a frequency value, etc. of the received wireless power. In some cases, the impedance matching circuit 870 may be omitted, and the present specification also includes an embodiment of the wireless power receiver 200 in which the impedance matching circuit 870 is omitted.
  • the coil assembly 880 includes at least one secondary coil, and may optionally further include an element for shielding a metal part of the receiver from a magnetic field.
  • Communication circuitry 890 may perform load modulation to communicate requests and other information to the power transmitter.
  • the power receiver 830 may switch a resistor or a capacitor to change the reflected impedance.
  • the control circuit 810 may control the received power. To this end, the control circuit 810 may determine/calculate a difference between an actual operating point of the power receiver 830 and a desired operating point. In addition, the control circuit 810 may adjust/reduce the difference between the actual operating point and the desired operating point by adjusting the reflected impedance of the power transmitter and/or performing a request to adjust the operating point of the power transmitter. When this difference is minimized, optimal power reception can be performed.
  • the communication circuit 890 and the control circuit 810 may be provided as separate devices/chipsets or as one device/chipset.
  • FIG. 9 shows a communication frame structure according to an embodiment. This may be a communication frame structure in a shared mode.
  • a slotted frame having a plurality of slots as shown in (A) and a free format frame having no specific shape as shown in (B) may be used.
  • the slot frame is a frame for transmitting short data packets from the wireless power receiver 200 to the wireless power transmitter 100, and the free-form frame does not have a plurality of slots, so It may be a frame that can be transmitted.
  • slot frame and the free-form frame may be changed to various names by those skilled in the art.
  • a slot frame may be changed to a channel frame
  • a free-form frame may be changed to a message frame, and the like.
  • the slot frame may include a sync pattern indicating the start of a slot, a measurement slot, nine slots, and an additional sync pattern having the same time interval prior to each of the nine slots.
  • the additional sync pattern is a sync pattern different from the sync pattern indicating the start of the frame described above. More specifically, the additional sync pattern may not indicate the start of a frame, but may indicate information related to adjacent slots (ie, two consecutive slots located on both sides of the sync pattern).
  • a sync pattern may be positioned between two consecutive slots among the nine slots.
  • the sync pattern may provide information related to the two consecutive slots.
  • the nine slots and the sync patterns provided prior to each of the nine slots may have the same time interval.
  • the nine slots may have a time interval of 50 ms.
  • the nine sync patterns may have a time length of 50 ms.
  • the free-form frame as shown in (B) may not have a specific shape other than a sync pattern and a measurement slot indicating the start of the frame. That is, the free-form frame is for performing a different role from the slot frame, for example, long data packets (eg, additional owner information packets) between the wireless power transmitter and the wireless power receiver.
  • long data packets eg, additional owner information packets
  • a wireless power transmitter configured with a plurality of coils or to perform communication, it may be used for a role of selecting one coil from among a plurality of coils.
  • FIG. 10 is a structure of a sync pattern according to an embodiment.
  • the sync pattern consists of a preamble, a start bit, a response field, a type field, an info field, and a parity bit.
  • the start bit is shown as ZERO.
  • the preamble consists of consecutive bits, and all of them may be set to 0. That is, the preamble may be bits for matching the time length of the sync pattern.
  • the number of bits constituting the preamble may depend on the operating frequency so that the length of the sync pattern is closest to 50 ms, but within a range that does not exceed 50 ms. For example, when the operating frequency is 100 kHz, the sync pattern may be composed of two preamble bits, and when the operating frequency is 105 kHz, the sync pattern may be composed of three preamble bits.
  • the start bit is a bit following the preamble and may mean ZERO.
  • the zero may be a bit indicating the type of the sync pattern.
  • the types of sync patterns may include frame sync including frame-related information and slot sync including slot information. That is, the sync pattern is located between consecutive frames and is a frame sync indicating the start of a frame, or is located between consecutive slots among a plurality of slots constituting a frame, and includes information related to the consecutive slots. It may be a slot sink including
  • the corresponding slot is slot sync located between the slots
  • the corresponding sync pattern is frame sync located between the frames.
  • the parity bit is the last bit of the sync pattern and may indicate information on the number of bits constituting the data fields (ie, the response field, the type field, and the information field) of the sync pattern.
  • the previous parity bit may be 1 when the number of bits constituting the data fields of the sync pattern is an even number, and 0 in other cases (ie, odd number).
  • the response field may include response information of the wireless power transmitter for communication with the wireless power receiver in a slot before the sync pattern.
  • the response field may have '00' when communication with the wireless power receiver is not detected.
  • the response field may have '01' when a communication error is detected in communication with the wireless power receiver.
  • the communication error may be a case in which two or more wireless power receivers attempt to access one slot and a collision between the two or more wireless power receivers occurs.
  • the response field may include information indicating whether a data packet has been correctly received from the wireless power receiver. More specifically, the response field is "10" (10-not acknowledge, NAK) when the wireless power transmitter rejects the data packet, and when the wireless power transmitter confirms the data packet , "11" (11-acknowledge, ACK).
  • the type field may indicate the type of the sync pattern. More specifically, the type field may have '1' indicating frame sync when the sync pattern is the first sync pattern of the frame (ie, the first sync pattern of the frame, which is located before the measurement slot).
  • the type field may have '0' indicating slot sync.
  • the meaning of the value of the information field may be determined according to the type of the sync pattern indicated by the type field. For example, when the type field is 1 (ie, indicating frame sync), the meaning of the information field may indicate the type of frame. That is, the information field may indicate whether the current frame is a slotted frame or a free-format frame. For example, when the information field is '00', it may indicate a slot frame, and when the information field is '01', it may indicate a free-form frame.
  • the information field may indicate the state of the next slot located after the sync pattern. More specifically, the information field is '00' when the next slot is a slot allocated to a specific wireless power receiver, and is a locked slot for temporary use by a specific wireless power receiver, '01' or '10' when any wireless power receiver is a freely usable slot.
  • FIG. 11 illustrates operating states of a wireless power transmitter and a wireless power receiver in a shared mode according to an embodiment.
  • the wireless power receiver operating in the shared mode includes a selection phase 1100 , an introduction phase 1110 , a configuration phase 1120 , and a negotiation state. It may operate in any one of a Negotiation Phase 1130 and a Power Transfer Phase 1140 .
  • the wireless power transmitter may transmit a wireless power signal to detect the wireless power receiver. That is, the process of detecting the wireless power receiver using the wireless power signal may be referred to as analog ping.
  • the wireless power receiver receiving the wireless power signal may enter the selection state 1100 .
  • the wireless power receiver entering the selection state 1100 may detect the presence of an FSK signal on the wireless power signal.
  • the wireless power receiver may perform communication in either the exclusive mode or the shared mode according to the presence of the FSK signal.
  • the wireless power receiver may operate in the shared mode, otherwise, the wireless power receiver may operate in the exclusive mode.
  • the wireless power receiver When the wireless power receiver operates in the shared mode, the wireless power receiver may enter the introduction state 1110 .
  • the wireless power receiver may transmit a control information packet to the wireless power transmitter in order to transmit a control information packet (CI) in the setting state, the negotiation state, and the power transmission state.
  • the control information packet may have a header and control-related information.
  • the control information packet may have a header of 0X53.
  • the wireless power receiver attempts to request a free slot to transmit a control information (CI) packet through the following configuration, negotiation, and power transmission steps. At this time, the wireless power receiver selects a free slot and transmits the first CI packet. If the wireless power transmitter responds with ACK to the CI packet, the wireless power transmitter enters the configuration phase. If the wireless power transmitter responds with NAK, another wireless power receiver is in the process of configuring and negotiating. In this case, the wireless power receiver re-attempts the request for a free slot.
  • CI control information
  • the wireless power receiver determines the position of a private slot in the frame by counting the remaining slot sinks up to the first frame sync. In all subsequent slot-based frames, the wireless power receiver transmits the CI packet through the corresponding slot.
  • the wireless power transmitter allows the wireless power receiver to proceed to the configuration step, the wireless power transmitter provides a series of locked slots for exclusive use of the wireless power receiver. This ensures that the wireless power receiver proceeds through the configuration phase without conflicts.
  • the wireless power receiver transmits sequences of data packets such as two identification data packets (IDHI and IDLO) using a lock slot. Upon completion of this step, the wireless power receiver enters the negotiation phase. In the negotiation phase, the wireless power transmitter continues to provide a lock slot for exclusive use to the wireless power receiver. This ensures that the wireless power receiver proceeds with the negotiation phase without collision.
  • IDHI and IDLO identification data packets
  • the wireless power receiver transmits one or more negotiation data packets using the corresponding lock slot, which may be mixed with private data packets.
  • the sequence ends with a specific request (SRQ) packet.
  • SRQ specific request
  • the wireless power receiver enters a power transmission phase, and the wireless power transmitter stops providing the lock slot.
  • the wireless power receiver transmits the CI packet using the allocated slot and receives power.
  • the wireless power receiver may include a regulator circuit.
  • the regulator circuit may be included in the communication/control circuit.
  • the wireless power receiver may self-regulate the reflected impedance of the wireless power receiver through a regulator circuit. In other words, the wireless power receiver may adjust the impedance reflected in order to transmit the amount of power required by the external load. This can prevent excessive power reception and overheating.
  • the wireless power transmitter may not perform power adjustment in response to the received CI packet (according to the operation mode), in this case, control to prevent an overvoltage condition may be required.
  • authentication authentication between a wireless power transmitter and a wireless power receiver is disclosed.
  • a wireless power transmission system using in-band communication can use USB-C authentication.
  • the authentication includes authentication of the wireless power transmitter by the wireless power receiver and authentication of the wireless power receiver by the wireless power transmitter.
  • FIG. 12 is a block diagram illustrating a wireless charging certificate format according to an embodiment.
  • the wireless charging certificate format is a wireless charging standard certificate structure version (Qi Authentication Certificate Structure Version), a reserved bit, a certificate type (certificate type), a signature offset (signature offset), a serial number (serial number), issuer ID (issuer ID), subject ID (subject ID), including a public key (public key) and signature (signature).
  • Qi Authentication Certificate Structure Version a wireless charging standard certificate structure version
  • certificate type certificate type
  • signature offset signature offset
  • serial number serial number
  • issuer ID issuer ID
  • subject ID subject ID
  • signature signature
  • the certificate type is, for example, 3 bits, which may indicate that the corresponding certificate is any one of a root certificate/intermediate certificate/leaf certificate, and may indicate that it is a certificate about a wireless power transmitter or a certificate about a wireless power receiver, can show all of them.
  • the certificate type is 3 bits, and may represent information on a Root Certificate, Manufacturer/Secondary Certificate, Product Unit Certificate (for the Power Transmitter, etc., respectively. More specifically, when the certificate type is '001'b, Indicates a root certificate, in the case of '010'b, an intermediate certificate, and in the case of '111'b, a leaf certificate of the wireless power transmitter. In addition, when the certificate type is '011'b, a wireless It may indicate a leaf certificate of the power receiver.
  • the wireless power transmitter may inform the wireless power receiver whether the authentication function is supported by using a capability packet (in case of authentication of the wireless power receiver by the wireless power receiver (authentication of PTx by PRx)) .
  • the wireless power receiver may inform the wireless power transmitter whether the authentication function is supported by using a configuration packet (in the case of authentication of the wireless power receiver by the wireless power transmitter (authentication of PRx by PTx) ).
  • a capability packet in case of authentication of the wireless power receiver by the wireless power receiver (authentication of PTx by PRx)
  • a configuration packet in the case of authentication of the wireless power receiver by the wireless power transmitter (authentication of PRx by PTx)
  • FIG. 13 is a structure of a capability packet of a wireless power transmitter according to an embodiment.
  • a capability packet having a corresponding header value of 0X31 is 3 bytes
  • the first byte (B0) includes a power class, a guaranteed power value
  • the second byte (B1) contains reserved and potential power value
  • the third byte (B2) is an authentication initiator (AI), an authentication responder (AR), reserve, WPID, Not Res Includes Sens.
  • AI authentication initiator
  • AR authentication responder
  • WPID WPID
  • Not Res Includes Sens is 1 bit, for example, if the value is '1b', it indicates that the corresponding wireless power transmitter can operate as the authentication initiator.
  • the authentication responder is 1 bit, for example, if the value is '1b', it indicates that the corresponding wireless power transmitter can operate as the authentication responder.
  • FIG. 14 is a configuration packet structure of a wireless power receiver according to an embodiment.
  • a configuration packet having a corresponding header value of 0X51 is 5 bytes
  • the first byte (B0) includes a power class and maximum power value
  • the second byte (B1) is Contains AI, AR, and Reserve
  • the third byte (B2) contains Prop, Reserve, ZERO, Count
  • the fourth byte (B3) contains Window size, window offset
  • the fifth byte (B4) ) includes Neg, polarity, depth, authentication (Auth), and reserve.
  • the authentication initiator is 1 bit, for example, if the value is '1b', it indicates that the corresponding wireless power receiver can operate as the authentication initiator.
  • the authentication responder is 1 bit, for example, if the value is '1b', it indicates that the corresponding wireless power receiver can operate as the authentication responder.
  • a message used in an authentication procedure is called an authentication message.
  • the authentication message is used to carry information related to authentication.
  • the authentication request is sent by the authentication initiator, and the authentication response is sent by the authentication responder.
  • the wireless power transmitter and the receiver may be authentication initiators or authentication responders. For example, when the wireless power transmitter is the authentication initiator, the wireless power receiver becomes the authentication responder, and when the wireless power receiver is the authentication initiator, the wireless power transmitter becomes the authentication responder.
  • the authentication request message includes GET_DIGESTS (i.e. 4 bytes), GET_CERTIFICATE (i.e. 8 bytes), and CHALLENGE (i.e. 36 bytes).
  • the authentication message may be called an authentication packet, authentication data, and authentication control information.
  • messages such as GET_DIGEST and DIGESTS may be referred to as GET_DIGEST packets, DIGEST packets, and the like.
  • 15 illustrates an application-level data stream between a wireless power transmitter and a receiver according to an example.
  • a data stream may include an auxiliary data control (ADC) data packet and/or an auxiliary data transport (ADT) data packet.
  • ADC auxiliary data control
  • ADT auxiliary data transport
  • ADC data packets are used to open a data stream.
  • the ADC data packet may indicate the type of message included in the stream and the number of data bytes.
  • An ADT data packet is a sequence of data containing an actual message.
  • ADC/end data packets are used to signal the end of the stream. For example, the maximum number of data bytes in a data transport stream may be limited to 2047.
  • ACK or NAC NAC
  • CE control error packet
  • DSR DSR
  • authentication-related information or other application-level information may be transmitted/received between the wireless power transmitter and the receiver.
  • the above-described public key-based authentication method between the wireless power transmitter and the wireless power receiver has a relatively large amount of computation compared to the symmetric key method, so it may be difficult to support low-performance devices used in the IoT environment. .
  • 16 is a flowchart illustrating an authentication method according to an embodiment of the present invention.
  • the authentication method according to an embodiment of the present invention is performed using a wireless power transmitter 300 , a wireless power receiver 400 , and a third device 500 .
  • the third device 500 may be a trusted user device (TUD), for example, a user's smartphone
  • the wireless power receiver 400 may be a third device ( 500) and an IoT device (eg, a smart watch, a wireless earphone, etc.) in which a wireless communication channel is created.
  • TDD trusted user device
  • IoT device eg, a smart watch, a wireless earphone, etc.
  • the wireless power transmitter 300 and the wireless power receiver 400 can communicate with each other through in-band (IB) communication, and the wireless power receiver 400 is a third device 500 and Communication is possible with each other through out-of-band (OOB) communication using a frequency different from the operating frequency of in-band communication.
  • out-band communication near field communication (NFC), Wi-Fi, and short-range wireless communication such as Bluetooth may be used.
  • NFC near field communication
  • Wi-Fi Wi-Fi
  • short-range wireless communication such as Bluetooth
  • BLE bluetooth low energy
  • a secure BLE (secure BLE) communication channel may be created between the wireless power receiver 400 and the third device 500 .
  • the wireless power receiver 400 operates as an authentication initiator, and the wireless power transmitter 300 operates as an authentication responder.
  • the wireless power receiver 400 which is the authentication initiator, transmits a certificate request message (Get_Certificate) through in-band (IB) communication (S701).
  • 17 is a diagram illustrating a format of an authentication request message (Get_Certificate) according to an example.
  • the wireless power transmitter 300 receiving the certificate request message (Get_Certificate) transmitted by the wireless power receiver 400 transmits a certificate message (Certificate) in response to the certificate request message (Get_Certificate) in-band (IB) communication. It is transmitted through (S702).
  • 18 is a diagram illustrating a format of a certificate message (Certificate) according to an example.
  • the wireless power receiver 400 receiving the certificate message (Certificate) transmitted by the wireless power transmitter 300 transmits the certificate message (Certificate) to the third device 500 through BLE communication (S703).
  • the wireless power receiver 400 is a GATT server
  • a certificate message may be transmitted to the third device 500 using a notification message.
  • the wireless power receiver 400 is a client, a certificate message may be transmitted to the third device 500 using a Write Request message.
  • the third device 500 Upon receiving the certificate message (Certificate), the third device 500 generates an authentication request message (Challenge), and receives the authentication request message (Challenge) as a response message to the certificate message (Certificate) wirelessly through BLE communication. It is transmitted to the device 400 (S704).
  • an authentication request message (Challenge) may be transmitted to the wireless power receiver 400 using a Write Request message.
  • an authentication request message (Challenge) may be transmitted to the wireless power receiver 400 using a notification message.
  • the wireless power receiver 400 Upon receiving the authentication request message (Challenge), the wireless power receiver 400 transmits the authentication request message (Challenge) through in-band (IB) communication (S705).
  • IB in-band
  • the format of the received authentication request message (Challenge) is different from the format of a predefined authentication request message (Challenge) used for authentication between the wireless power receiver 400 and the wireless power transmitter 300 .
  • the device 400 may convert the received authentication request message (Challenge) into a format of an authentication request message (Challenge) used for authentication between the wireless power receiver 400 and the wireless power transmitter 300 and transmit it.
  • 19 is a diagram illustrating a format of an authentication request message (Challenge) to be transmitted by the wireless power receiver 400 according to an example.
  • the wireless power transmitter 300 receiving the authentication request message (Challenge) transmitted by the wireless power receiver 400 generates an authentication response message (Challenge_Auth) with a private key signature and an authentication response
  • a message (Challenge_Auth) is transmitted through in-band (IB) communication (S706).
  • 20 is a diagram illustrating a format of an authentication response message (Challenge_Auth) according to an example.
  • the wireless power receiver 400 receiving the authentication response message (Challenge_Auth) transmitted by the wireless power transmitter 300 transmits the authentication response message (Challenge_Auth) to the third device 500 through BLE communication (S707) ).
  • an authentication response message (Challenge_Auth) may be transmitted to the third device 500 using a notification message.
  • an authentication response message (Challenge_Auth) may be transmitted to the third device 500 using a Write Request message.
  • the third device 500 receiving the authentication response message (Challenge_Auth) signs the authentication response message (Challenge_Auth) with the public key of the previously received certificate message (Certificate) from the wireless power receiver 400 ( signature), and transmits the verification result to the wireless power receiver 400 through BLE communication (S708).
  • the wireless power receiver 400 determines whether the wireless power transmitter 300 is authenticated based on the verification result received from the third device 500 .
  • the wireless power receiver 400 since the third device 500 performs the verification algorithm using the public key, which has a large computational load, instead of the wireless power receiver 400, the wireless power receiver 400 performs verification using the public key. There is no need to implement an algorithm. Accordingly, the low-performance wireless power receiver 400 may perform authentication on the wireless power transmitter 300 without directly performing public key operation.
  • 21 is a flowchart illustrating an authentication method according to another embodiment of the present invention.
  • authentication has already been performed between the wireless power transmitter 300 and the third device 500 at a time in the past (eg, according to the embodiment described with reference to FIG. 16 ), and the third device It is assumed that the 500 holds a certificate of the wireless power transmitter 300 .
  • the wireless power receiver 400 operates as an authentication initiator, and the wireless power transmitter 300 operates as an authentication responder.
  • the wireless power receiver 400 that is the authentication initiator transmits a message including identification information of the wireless power transmitter 300 to the third device 500 through BLE communication. do (S801).
  • the wireless power receiver 400 may request identification from the wireless power transmitter 300 . Accordingly, the wireless power receiver 400 requests identification from the wireless power transmitter 300 in advance, receives identification information of the wireless power transmitter 300, and transmits it to a third device 500 through BLE communication.
  • can transmit 22 is a diagram illustrating a format of an identification information packet of a wireless power transmitter according to an example. 22 , the identification information packet of the wireless power transmitter may include information (Manufacturer Code and Subject ID) for identifying the wireless power transmitter. According to the current qi standard, the identification information packet of the wireless power transmitter includes only the manufacturer code as identification information, but there is a problem in that other products of the same manufacturer cannot be identified with only the manufacturer code.
  • the identification information packet of the wireless power transmitter of FIG. 22 further includes a Subject ID in addition to the Manufacturer Code so that the wireless power transmitter of the same manufacturer can also be individually identified.
  • Subject ID may include a certificate of the wireless power transmitter, for example, may include at least one of Root Certificate, Manufacturer Certificates, Secondary Certificates, and Product Unit Certificates. 22 shows an example of the format of a packet including a Manufacturer Code and a Subject ID as information for identifying the wireless power transmitter, but according to an embodiment, the identification information packet of the wireless power transmitter does not include the Manufacturer Code.
  • the Subject ID may be included, and in another embodiment, other identification information (eg, identification information similar to the Basic Device Identifier of the ID data packet of the wireless power receiver) may be included in addition to the Subject ID.
  • the wireless power receiver 400 may transmit a message (WPC_Auth_Request) requesting an authentication request together with the identification information of the wireless power transmitter 300 to the third device 500 through BLE communication (S801). ).
  • 23 is a diagram illustrating authentication requests used by a wireless power receiver according to the current WPC wireless charging standard (Qi).
  • an authentication request (WPC_Auth_Request) for inducing the wireless power receiver 400 to request an authentication request (Challenge) from the third device 500 may be newly defined.
  • authentication for inducing the wireless power receiver 400 to request an authentication challenge from the third device 500 for 0xC which is not defined among the authentication requests shown in FIG. 23 .
  • It can be defined as a request (WPC_Auth_Request).
  • any one of the reserved values is defined as an authentication request (WPC_Auth_Request) for inducing the wireless power receiver 400 to request an authentication request (Challenge) from the third device 500 . can do.
  • a message may be transmitted to the third device 500 using a notification message.
  • the message may be transmitted to the third device 500 using a Write Request message.
  • the third device 500 receiving the message (WPC_Auth_Request) requesting the identification information and/or the authentication request (Challenge) of the wireless power transmitter 300 from the wireless power receiver 400 sends the authentication request message (Challenge) is generated, and an authentication request message (Challenge) is transmitted to the wireless power receiver 400 through BLE communication as a response message to the message received from the wireless power receiver 400 (S802).
  • an authentication request message (Challenge) may be transmitted to the wireless power receiver 400 using a Write Request message.
  • an authentication request message (Challenge) may be transmitted to the wireless power receiver 400 using a notification message.
  • the wireless power receiver 400 Upon receiving the authentication request message (Challenge), the wireless power receiver 400 transmits the authentication request message (Challenge) through in-band (IB) communication (S803).
  • the wireless power transmitter 300 receiving the authentication request message (Challenge) transmitted by the wireless power receiver 400 generates an authentication response message (Challenge_Auth) with a private key signature and an authentication response
  • a message (Challenge_Auth) is transmitted through in-band (IB) communication (S804).
  • the wireless power receiver 400 receiving the authentication response message (Challenge_Auth) transmitted by the wireless power transmitter 300 transmits the authentication response message (Challenge_Auth) to the third device 500 through BLE communication (S805) ).
  • the third device 500 receiving the authentication response message (Challenge_Auth) signs the authentication response message (Challenge_Auth) with the public key of the previously received certificate message (Certificate) from the wireless power receiver 400 ( signature), and transmits the verification result to the wireless power receiver 400 through BLE communication (S806).
  • the wireless power receiver 400 determines whether the wireless power transmitter 300 is authenticated based on the verification result received from the third device 500 .
  • steps S803 to S806 are similar to steps S705 to S708 described above, an additional description thereof will be omitted.
  • the wireless power receiver 400 since the third device 500 performs the verification algorithm using the public key, which has a large computational load, instead of the wireless power receiver 400, the wireless power receiver 400 performs verification using the public key. There is no need to implement an algorithm, and authentication between the wireless power receiver 400 and the wireless power transmitter 300 in which the wireless power receiver 400, which is the authentication initiator, receives a digest message of 32 bytes or more through in-band communication Compared to the procedure, the wireless power receiver 400 transmits identification information (eg, a 9-byte identification information packet shown in FIG. 22 ) of the wireless power transmitter 300 through BLE communication. , authentication can be performed faster.
  • identification information eg, a 9-byte identification information packet shown in FIG. 22
  • 24 is a flowchart illustrating an authentication method according to another embodiment of the present invention.
  • the authentication method according to an embodiment of the present invention is performed using a wireless power transmitter 300 , a wireless power receiver 400 , and a third device 500 .
  • the wireless power transmitter 300 operates as an authentication initiator
  • the wireless power receiver 400 operates as an authentication responder.
  • the wireless power transmitter 300 and the wireless power receiver 400 can communicate with each other through in-band (IB) communication, and the wireless power receiver 400 is a third device 500 and the in-band (IB).
  • in-band communication is possible through out-of-band (OOB) communication using a frequency different from the operating frequency of the communication.
  • OOB out-of-band
  • BLE blue low energy
  • the communication channel between the wireless power receiver 400 and the third device 500 may not be a secure BLE (secure BLE) communication channel.
  • the wireless power transmitter 300 which is the authentication initiator, transmits a certificate request message (Get_Certificate) through in-band (IB) communication (S901).
  • the wireless power receiver 400 receiving the certificate request message (Get_Certificate) transmitted by the wireless power transmitter 300 transmits the certificate request message (Get_Certificate) to the third device 500 through BLE communication (S902) ).
  • a certificate request message (Get_Certificate) may be transmitted to the third device 500 using a notification message.
  • a certificate request message Get_Certificate may be transmitted to the third device 500 using a Write Request message.
  • the third device 500 Upon receiving the certificate request message (Get_Certificate), the third device 500 generates an authentication request message (Challenge), and transmits the certificate message (Certificate) as a response message to the certificate request message (Get_Certificate) wirelessly through BLE communication. It transmits to the receiving device 400 (S903).
  • the certificate message (Certificate) transmitted by the third device 500 may be its own certificate message (Certificate), and in this case, the certificate message (Certificate) is the third device 500 when the wireless power receiver It may be a certificate message transmitted to the wireless power transmitter.
  • a certificate message may be transmitted to the wireless power receiver 400 using a Write Request message.
  • a certificate message may be transmitted to the wireless power receiver 400 using a notification message.
  • the wireless power receiver 400 Upon receiving the certificate message (Certificate), the wireless power receiver 400 transmits the certificate message (Certificate) through in-band (IB) communication (S904).
  • the wireless power receiver ( 400 may convert the received certificate message (Certificate) into a format of a certificate message (Certificate) used for authentication between the wireless power receiver 400 and the wireless power transmitter 300 and transmit it.
  • the wireless power transmitter 300 receiving the certificate message (Certificate) transmitted by the wireless power receiver 400 transmits an authentication request message (Challenge) in response to the certificate message (Certificate) through in-band (IB) communication. It transmits (S905).
  • the wireless power receiver 400 receiving the authentication request message (Challenge) transmitted by the wireless power transmitter 300 transmits the authentication request message (Challenge) to the third device 500 through BLE communication (S906) ).
  • the wireless power receiver 400 is a GATT server
  • an authentication request message (Challenge) may be transmitted to the third device 500 using a notification message.
  • an authentication request message (Challenge) may be transmitted to the third device 500 using a Write Request message.
  • the third device 500 Upon receiving the authentication request message (Challenge), the third device 500 generates an authentication response message (Challenge_Auth) as a response message to the authentication request message (Challenge) and transmits it to the wireless power receiver 400 through BLE communication. do (S907).
  • the authentication response message (Challenge_Auth) transmitted by the third device 500 may be an authentication response message (Challenge_Auth) transmitted to the wireless power transmitter when the third device 500 is a wireless power receiver.
  • an authentication response message (Challenge_Auth) may be transmitted to the wireless power receiver 400 using a Write Request message.
  • an authentication response message (Challenge_Auth) may be transmitted to the wireless power receiver 400 using a notification message.
  • the wireless power receiver 400 Upon receiving the authentication response message (Challenge_Auth), the wireless power receiver 400 transmits the authentication response message (Challenge_Auth) through in-band (IB) communication (S908).
  • the wireless power transmitter 300 receiving the authentication response message (Challenge_Auth) signs the authentication response message (Challenge_Auth) with the public key of the certificate message (Certificate) previously received from the wireless power receiver 400 ( signature) and determine whether the wireless power receiver 400 is authenticated. That is, the wireless power transmitter 300 determines whether the wireless power receiver 400 is authenticated based on the certificate of the third device 500 .
  • the wireless power receiver 400 can be authenticated without mounting a certificate, and there is no need to implement a verification algorithm using a public key with a large computational load.
  • 25 is a flowchart illustrating an authentication method according to another embodiment of the present invention.
  • the wireless power transmitter 300 and the wireless power receiver 400 can communicate with each other through in-band (IB) communication, and wireless power
  • the receiver 400 and the third device 500 can communicate with each other through out-of-band (OOB) communication, and the third device 500 and the wireless power transmitter 300 are also Communication is possible with each other through out-of-band (OOB) communication.
  • OOB out-of-band
  • an example of out-band communication will be described based on BLE (bluetooth low energy).
  • the communication channel between the wireless power receiver 400 and the third device 500 and between the third device 500 and the wireless power transmitter 300 does not need to be a secure BLE (secure BLE) communication channel. .
  • the wireless power transmitter 300 which is the authentication initiator, transmits a certificate request message (Get_Certificate) through in-band (IB) communication (S1001).
  • the wireless power receiver 400 receiving the certificate request message (Get_Certificate) transmitted by the wireless power transmitter 300 transmits the certificate request message (Get_Certificate) to the third device 500 through BLE communication (S1002) ). At this time, the wireless power receiver 400 may transmit the identification information of the wireless power transmitter 300 together with the certificate request message (Get_Certificate) to the third device 500 through BLE communication. As described in the embodiment according to FIG. 21 , the wireless power receiver 400 requests identification from the wireless power transmitter 300 in advance in an extended protocol, and identifies the wireless power transmitter 300 . After receiving the identification information packet of the wireless power transmitter 300 as shown in FIG. 22 as information (identification), it may be transmitted to the third device 500 .
  • the certificate request message (Get_Certificate) and/or identification information of the wireless power transmitter 300 is transmitted using a notification message when the wireless power receiver 400 is a GATT server, and wireless power When the receiving device 400 is a client, it is transmitted using a Write Request message.
  • the third device 500 Upon receiving the certificate request message (Get_Certificate) and/or the identification information of the wireless power transmitter 300, the third device 500 generates an authentication request message (Challenge), and As a response message, a certificate message is transmitted to the wireless power transmitter 300 through BLE communication (S1003).
  • the certificate message (Certificate) may be its own certificate message (Certificate), in this case, the certificate message (Certificate) is a certificate message transmitted to the wireless power transmitter when the third device 500 is a wireless power receiver ( certificate).
  • the third device 500 may transmit identification information of the wireless power receiver 400 together with a certificate message to the wireless power transmitter 300 through BLE communication.
  • 26 is a diagram illustrating a format of an identification information packet of a wireless power receiver according to an example.
  • the identification information of the wireless power receiver 400 may be transmitted by the wireless power receiver 400 together with the certificate request message (Get_Certificate) in step S1002.
  • a certificate message and/or identification information of the wireless power receiver 400 is transmitted using a Write Request message when the third device 500 is a client, and the third When the device 500 of the GATT server is transmitted using a notification (Notification) message.
  • the wireless power transmitter 300 receiving the certificate message (Certificate) transmitted by the third device 500 transmits the authentication request message (Challenge) in response to the certificate message (Certificate) through in-band (IB) communication. transmit (S1004).
  • the wireless power receiver 400 receiving the authentication request message (Challenge) transmitted by the wireless power transmitter 300 transmits the authentication request message (Challenge) to the third device 500 through BLE communication (S1005) ).
  • the wireless power receiver 400 is a GATT server
  • an authentication request message (Challenge) may be transmitted to the third device 500 using a notification message.
  • an authentication request message (Challenge) may be transmitted to the third device 500 using a Write Request message.
  • the third device 500 Upon receiving the authentication request message (Challenge), the third device 500 generates an authentication response message (Challenge_Auth) as a response message to the authentication request message (Challenge) and transmits it to the wireless power transmitter 300 through BLE communication. do (S1006).
  • the authentication response message (Challenge_Auth) transmitted by the third device 500 may be an authentication response message (Challenge_Auth) transmitted to the wireless power transmitter when the third device 500 is a wireless power receiver.
  • the third device 500 may transmit the identification information of the wireless power receiver 400 together with the authentication response message (Challenge_Auth) to the wireless power transmitter 300 through BLE communication.
  • the authentication response message (Challenge_Auth) and/or identification information of the wireless power receiver 400 is transmitted using a Write Request message when the third device 500 is a client, When the device 500 of 3 is a GATT server, it is transmitted using a notification message.
  • the wireless power transmitter 300 receiving the authentication response message (Challenge_Auth) verifies the signature of the authentication response message (Challenge_Auth) with the public key of the previously received certificate message (Certificate), and wireless power It is determined whether the receiving device 400 is authenticated. That is, the wireless power transmitter 300 determines whether the wireless power receiver 400 is authenticated based on the certificate of the third device 500 .
  • the wireless power receiver 400 can be authenticated without mounting a certificate, and there is no need to implement a verification algorithm using a public key with a large computational load.
  • the third device 500 since the third device 500 transmits a message through direct BLE communication with the wireless power transmitter 300, the proportion of the wireless power receiver 400 participating in message exchange is lower than in the embodiment of FIG. As a result, the burden on the low-performance wireless power receiver 400 is reduced.
  • 27 is a diagram schematically illustrating an authentication method according to another embodiment of the present invention.
  • the third device 500 is a wireless power transmitter ( 300) and the wireless power receiver 400 each transmit a symmetric key (SK_PTx_TUD), and the wireless power transmitter 300 and the wireless power receiver 400 mutually authenticate each other through whether they have a symmetric key (SK_PTx_TUD).
  • the third device 500 is a Trusted User Device (TUD), and the third device 500 is a wireless power receiver to the wireless power transmitter 300 and a wireless power consortium (WPC). It is a device that has a history of performing authentication according to For example, the third device 500 may be a user's smartphone.
  • TMD Trusted User Device
  • WPC wireless power consortium
  • the wireless power transmitter 300 and the wireless power receiver 400 can communicate with each other through in-band (IB) communication, and the wireless power receiver 400 is a third device 500 and the in-band (IB).
  • in-band communication is possible through out-of-band (OOB) communication using a frequency different from the operating frequency of the communication.
  • OOB out-of-band
  • NFC near field communication
  • Wi-Fi Wi-Fi
  • short-range wireless communication such as Bluetooth
  • an example of out-band communication will be described based on BLE (bluetooth low energy).
  • a secure BLE (secure BLE) communication channel may be created between the wireless power receiver 400 and the third device 500 .
  • 28 is a flowchart illustrating a method of generating a symmetric key using a nonce between a wireless power transmitter and a third device.
  • the wireless power transmitter 300 and the third device 500 may operate as an authentication initiator or an authentication responder, respectively.
  • the wireless power transmitter 300 is an authentication initiator
  • the third device 500 becomes an authentication responder
  • the third device 500 is an authentication initiator.
  • the wireless power transmitter 300 becomes an authentication responder.
  • the authentication initiator 601 transmits a mutual authentication request message (Mutual Auth Request) to the authentication responder 602 (S1011).
  • the mutual authentication request message includes nonce information (Nonce_Init) of the authentication initiator.
  • the authentication responder 602 transmits a first mutual authentication response message (Mutual Auth Response1) to the authentication initiator 601 in response to the mutual authentication request message (Mutual Auth Request) (S1012).
  • 29 is a diagram illustrating a format of a first mutual authentication response message according to an example.
  • the first mutual authentication response message includes the responder's Qi authentication protocol (Qi Authentication Protocol_resp), the message type (Message Type), the responder's product unit certificate (Product Unit Certificate_resp), and the responder's nonce information (Nonce_resp) ), the responder's ephemeral public key (Ephemeral Public Key_resp), and the responder's signature (Signature_resp) may be included.
  • Qi Authentication Protocol_resp the message type
  • Message Type the responder's product unit certificate
  • the responder's nonce information Nonce information
  • the responder's ephemeral public key Ephemeral Public Key_resp
  • the responder's signature Signature_resp
  • the Qi Authentication Protocol may include information about an Authentication Protocol Version.
  • the message type may be selected from any one of reserved values in the Qi standard of WPC.
  • the message type of the first mutual authentication response message may be defined as 0xE or 0x5.
  • the responder's Product Unit Certificate_resp may be defined as a field of 121 bytes
  • the responder's nonce information (Nonce_resp) may be defined as a field of 16 bytes
  • the responder's ephemeral public key (Ephemeral Public Key_resp) may be defined as a field of 16 bytes.
  • the responder's signature may be defined as a 64-byte field
  • the responder's signature may be generated in an ECDSA with 256 bits method.
  • the authentication initiator 601 transmits a second mutual authentication response message (Mutual Auth Response2) to the authentication responder 602 in response to the first mutual authentication response message (Mutual Auth Response1) (S1013).
  • the format of the second mutual authentication response message may be similar to the format of the first mutual authentication response message shown in FIG. 29 .
  • the second mutual authentication response message may not include nonce information. That is, in the second mutual authentication response message, the initiator's Qi authentication protocol (Qi Authentication Protocol_init), message type (Message Type), the initiator's product unit certificate (Product Unit Certificate_init), the initiator's temporary public key (Ephemeral Public Key_init) and initiation The person's signature (Signature_init) may be included.
  • any one of reserved values in the Qi standard of WPC may be selected, but it is different from the message type of the first mutual authentication response message.
  • a value can be selected.
  • the message type of the second mutual authentication response message may be defined as 0x5.
  • a Shared Secret / Encryption Key may be generated through an Elliptic Curve Diffie-Hellman (ECDH) algorithm.
  • a symmetric key can be generated through the Elliptic Curve Integrated Encryption scheme (ECIES) algorithm, and can be encrypted using existing ECC standards such as NIST and SECG and AES-128 / 256 encryption algorithms.
  • ECIES Elliptic Curve Integrated Encryption scheme
  • the message delivery of the above-described steps S1011 to S1013 is performed through in-band (IB) communication in a state where the third device 500 is located in the operating volume of the wireless power transmitter 300 as a wireless power receiver. can be done
  • FIG. 30 is a flowchart illustrating a method of generating a symmetric key using a time stamp between the wireless power transmitter and a third device.
  • the wireless power transmitter 300 and the third device 500 may operate as an authentication initiator or an authentication responder, respectively.
  • the wireless power transmitter 300 is an authentication initiator
  • the third device 500 becomes an authentication responder
  • the third device 500 is an authentication initiator.
  • the wireless power transmitter 300 becomes an authentication responder.
  • the authentication initiator 601 transmits a mutual authentication request message (Mutual Auth Request) to the authentication responder 602 (S1021).
  • the mutual authentication request message includes time stamp information (TimeStamp_init) of the authentication initiator.
  • 31 is a diagram illustrating a format of a mutual authentication request message according to an example.
  • the mutual authentication request message includes the initiator's Qi Authentication Protocol (Qi Authentication Protocol), the message type (Message Type), the initiator's product unit certificate (Product Unit Certificate_resp), and the initiator's time stamp information (TimeStamp_init) , the initiator's ephemeral public key (Ephemeral Public Key_resp) and the initiator's signature (Signature_resp) may be included.
  • Qi Authentication Protocol the message type
  • Message Type the initiator's product unit certificate
  • TimeStamp_init the initiator's time stamp information
  • the initiator's ephemeral public key Ephemeral Public Key_resp
  • the initiator's signature Signature_resp
  • the Qi Authentication Protocol may include information about an Authentication Protocol Version.
  • the message type may be selected from any one of reserved values in the Qi standard of WPC.
  • the message type of the mutual authentication request message may be defined as 0xE or 0x5.
  • the initiator's product unit certificate (Product Unit Certificate_init) may be defined as a 121 byte field
  • the initiator's time stamp information (TimeStamp_init) may be defined as a 4 byte field
  • the initiator's Ephemeral Public Key_ init) may be defined as a field of 64 bytes
  • the initiator's signature (Signature_init) may be defined as a field of 64 bytes.
  • the initiator's signature (Signature_init) may be generated in an ECDSA with 256 bits method.
  • the authentication responder 602 transmits a mutual authentication response message (Mutual Auth Response) to the authentication initiator 601 in response to the mutual authentication request message (Mutual Auth Request) (S1022).
  • the format of the mutual authentication response message may be similar to the format of the mutual authentication request message shown in FIG. 31 . That is, in the mutual authentication response message, the responder's Qi Authentication Protocol (Qi Authentication Protocol_resp), message type (Message Type), the responder's Product Unit Certificate_resp, the responder's time stamp information (TimeStamp_resp), and the responder's temporary public key (Ephemeral Public Key_resp) and the responder's signature (Signature_resp) may be included.
  • Qi Authentication Protocol Qi Authentication Protocol
  • message Type message type
  • the responder's Product Unit Certificate_resp the responder's time stamp information
  • timeStamp_resp the responder's temporary public key
  • any one of the values reserved in the Qi standard of WPC may be selected, but a value different from the message type of the mutual authentication request message may be selected.
  • the message type of the mutual authentication request message is 0xE
  • the message type of the mutual authentication response message may be defined as 0x5.
  • a Shared Secret / Encryption Key may be generated through an Elliptic Curve Diffie-Hellman (ECDH) algorithm.
  • a symmetric key can be generated through the Elliptic Curve Integrated Encryption scheme (ECIES) algorithm, and can be encrypted using existing ECC standards such as NIST and SECG and AES-128 / 256 encryption algorithms.
  • ECIES Elliptic Curve Integrated Encryption scheme
  • steps S1021 and S1022 are performed through in-band (IB) communication in a state where the third device 500 is located in the operating volume of the wireless power transmitter 300 as a wireless power receiver. can be done
  • FIG. 32 is a flowchart for explaining a method in which a third device transmits a symmetric key to a wireless power receiver.
  • the wireless power receiver 400 is connected to the third device 500 through out-band communication.
  • the wireless power receiver 400 may be communicatively connected to the third device 500 through a secure BLE (secure BLE) communication channel.
  • the third device 500 transmits the symmetric key (SK_TUD_PTx) generated through the symmetric key generation method shown in FIG. 28 or 30 to the wireless power receiver 400 through BLE communication (S1031).
  • the third device 500 transmits the identification information of the wireless power transmitter 300 together with the symmetric key (SK_TUD_PTx) and the third device 500 generates the corresponding symmetric key (SK_TUD_PTx). have.
  • the third device 500 generates a symmetric key whenever authentication is performed with the new wireless power transmitter 300, and uses the identification information of the wireless power transmitter 300 and the generated symmetric key.
  • the step (S1031) of transmitting to the wireless power receiver 400 through BLE communication may be repeated.
  • Symmetric key (SK_TUD_PTx) and/or identification information of the wireless power transmitter 300 is transmitted using a Write Request message when the third device 500 is a client, and the third When the device 500 of the GATT server is transmitted using a notification (Notification) message.
  • 33 is a flowchart illustrating a method for mutual authentication between the wireless power receiver 400 and the wireless power transmitter 300 using a symmetric key using a nonce.
  • the wireless power receiver 400 may operate as an authentication initiator, and the wireless power transmitter 300 may operate as an authentication responder.
  • the wireless power receiver 400 and the wireless power transmitter 300 may transmit a message through in-band communication.
  • the wireless power receiver 400 which is an authentication initiator, transmits a Delegated Authentication Request (DEL_AUTH_REQ) (S1041).
  • the wireless power receiver 400 may be in a state in which identification information of the wireless power transmitter 300 has been acquired in an identification process, etc., and matched with the identification information of the wireless power transmitter 300 . If there is a symmetric key to be used, an authentication request message (DEL_AUTH_REQ) is transmitted using the possessed symmetric key.
  • the delegation authentication request message (DEL_AUTH_REQ) includes nonce information (Nonce_init) of the initiator.
  • the format of the authentication request message (DEL_AUTH_REQ) may be the same as that of the authentication request message (Challenge) shown in FIG. 19 .
  • the wireless power transmitter 300 Upon receiving the authentication request message (DEL_AUTH_REQ) from the wireless power receiver 400, the wireless power transmitter 300 generates nonce information (Nonce_resp) of the responder, and utilizes the possessed symmetric key to obtain the initiator's nonce information (Nonce_init) and The nonce information (Nonce_resp) of the responder is encrypted together, and the first delegated authentication response message (Delegated Authentication Response 1, DEL_AUTH_RESP 1) including the encrypted nonce information ( ⁇ Nonce ⁇ encrypted) is transmitted (S1042).
  • DEL_AUTH_RESP 1 Delegated Authentication Response 1
  • 34 34 is a diagram illustrating a format of a first delegation authentication response message (DEL_AUTH_RESP 1) according to an example.
  • the first delegation authentication response message may include the responder's Qi authentication protocol (Qi Authentication Protocol_resp), message type (Message Type), and encrypted nonce information ( ⁇ Nonce ⁇ encrypted). have.
  • the Qi Authentication Protocol may include information about an Authentication Protocol Version.
  • the message type may be selected from any one of reserved values in the Qi standard of WPC.
  • the message type of the first delegation authentication response message (DEL_AUTH_RESP 1) may be defined as 0xF.
  • the encrypted nonce information ( ⁇ Nonce ⁇ encrypted) may be 32 bytes.
  • the wireless power receiver 400 that has received the first delegation authentication response message (DEL_AUTH_RESP 1) from the wireless power transmitter 300 uses the possessed symmetric key to encrypt the first delegation authentication response message (DEL_AUTH_RESP 1) contained in Decrypt the nonce information ( ⁇ Nonce ⁇ encrypted) to check the nonce information (nonce information (Nonce_init) of the initiator and nonce information (Nonce_resp) of the responder), and the second delegated authentication response message (Delegated Authentication Response 2, DEL_AUTH_RESP 2) transmit (S1043).
  • the second delegation authentication response message (DEL_AUTH_RESP 2) may have a format similar to that of the first delegation authentication response message (DEL_AUTH_RESP 1).
  • the second delegation authentication response message may include an initiator's Qi authentication protocol (Qi Authentication Protocol_resp), a message type (Message Type), and encrypted nonce information ( ⁇ Nonce ⁇ encrypted).
  • the Qi Authentication Protocol may include information about an Authentication Protocol Version.
  • the message type of the second delegation authentication response message (DEL_AUTH_RESP 1), any one of reserved values in the Qi standard of WPC may be selected, but the first delegation authentication response message (DEL_AUTH_RESP) A value different from the message type of 1) may be selected.
  • the message type of the second delegation authentication response message (DEL_AUTH_RESP 2) may be defined as 0x10.
  • the encrypted nonce information may be encrypted (encrypted) of the initiator's nonce information (Nonce_init) and the responder's nonce information (Nonce_resp) by using a possessed symmetric key.
  • the encrypted nonce information ( ⁇ Nonce ⁇ encrypted) may be 32 bytes.
  • the encrypted nonce information ( ⁇ Nonce ⁇ encrypted) of the first delegation authentication response message (DEL_AUTH_RESP 1) is decrypted through a symmetric key matching the identification information of the wireless power transmitter 300 . Since it means that the wireless power transmitter 300 also has a symmetric key, the wireless power transmitter 300 can be trusted.
  • the wireless power transmitter 300 that has received the second delegation authentication response message (DEL_AUTH_RESP 2) from the wireless power receiver 400 uses the possessed symmetric key to encrypt the second delegation authentication response message (DEL_AUTH_RESP 2) included in the
  • the wireless power receiver 400 is authenticated by decrypting the nonce information ( ⁇ Nonce ⁇ encrypted) and checking the nonce information (nonce information (Nonce_init) of the initiator and nonce information (Nonce_resp) of the responder).
  • the fact that the encrypted nonce information ( ⁇ Nonce ⁇ encrypted) included in the second delegation authentication response message (DEL_AUTH_RESP 2) is decrypted through the symmetric key held by the wireless power transmitter 300 means that the wireless power receiver 400 is also Since it means that the symmetric key is possessed, the wireless power receiver 400 can be trusted.
  • the initiator and responder may be configured to generate nonce information such that it does not overlap with past nonce information.
  • 35 is a flowchart illustrating a method for mutual authentication between a wireless power receiver and a wireless power transmitter using a symmetric key using a time stamp.
  • the wireless power receiver 400 may operate as an authentication initiator, and the wireless power transmitter 300 may operate as an authentication responder.
  • the wireless power receiver 400 and the wireless power transmitter 300 may transmit a message through in-band communication.
  • the wireless power receiver 400 which is an authentication initiator, transmits a Delegated Authentication Request (DEL_AUTH_REQ) message (S1051).
  • the wireless power receiver 400 may be in a state in which identification information of the wireless power transmitter 300 has been acquired in an identification process, etc., and matched with the identification information of the wireless power transmitter 300 . If there is a symmetric key to be used, a delegation authentication request message (DEL_AUTH_REQ) is transmitted using the possessed symmetric key.
  • the delegation authentication request message (DEL_AUTH_REQ) includes time stamp information (TimeStamp_init) of the initiator.
  • the delegated authentication request message includes the initiator's Qi authentication protocol (Qi Authentication Protocol_resp), the message type (Message Type), and the encrypted initiator's timestamp information ( ⁇ TimeStamp ⁇ encrypted).
  • Qi Authentication Protocol may include information about an Authentication Protocol Version.
  • the message type may be selected from any one of reserved values in the Qi standard of WPC.
  • the message type of the delegation authentication request message (DEL_AUTH_REQ) may be defined as 0xF.
  • the encrypted initiator's time stamp information ( ⁇ TimeStamp ⁇ encrypted) may be 4 bytes.
  • the wireless power transmitter 300 receiving the delegation authentication request message (DEL_AUTH_REQ) from the wireless power receiver 400 uses the possessed symmetric key to encrypt the time stamp information of the initiator included in the delegation authentication request message (DEL_AUTH_REQ) ( ⁇ TimeStamp ⁇ encrypted) is decrypted to verify the initiator's time stamp information (TimeStamp_init).
  • the fact that the encrypted initiator's time stamp information ( ⁇ TimeStamp ⁇ encrypted) included in the delegation authentication request message (DEL_AUTH_REQ) is decrypted through the symmetric key held by the wireless power transmitter 300 means that the wireless power receiver 400 is also Since it means that the symmetric key is possessed, the wireless power receiver 400 can be trusted.
  • the delegation authentication response message (DEL_AUTH_RESP) may have a format similar to the delegation authentication request message (DEL_AUTH_REQ). That is, the delegation authentication response message (DEL_AUTH_RESP) may include the responder's Qi authentication protocol (Qi Authentication Protocol_resp), the message type (Message Type), and the encrypted responder's time stamp information ( ⁇ TimeStamp ⁇ encrypted).
  • the Qi Authentication Protocol may include information about an Authentication Protocol Version.
  • the message type of the delegation authentication response message (DEL_AUTH_RESP) any one of the values reserved in the Qi standard of WPC can be selected, but the message type of the delegation authentication request message (DEL_AUTH_REQ) and A different value may be selected.
  • the message type of the delegation authentication response message (DEL_AUTH_RESP) may be defined as 0x10.
  • the encrypted responder's time stamp information ( ⁇ TimeStamp ⁇ encrypted) may be 4 bytes.
  • the wireless power receiver 400 which has received the delegation authentication response message (DEL_AUTH_RESP) from the wireless power transmitter 300, uses the possessed symmetric key to encrypt the responder's time stamp information (DEL_AUTH_RESP) included in the delegation authentication response message (DEL_AUTH_RESP) ( ⁇ TimeStamp ⁇ encrypted) is decrypted to verify the responder's time stamp information (TimeStamp_resp).
  • time stamp information ( ⁇ TimeStamp ⁇ encrypted) of the encrypted responder included in the delegation authentication response message (DEL_AUTH_RESP) is decrypted through the symmetric key held by the wireless power receiver 400 means that the wireless power transmitter 300 is also Since it means that the symmetric key is possessed, the wireless power transmitter 300 can be trusted.
  • the decrypted time stamp information of the initiator or responder is compared with the current time, and when a difference of more than a certain threshold occurs, it is determined that it is inappropriate and thus authentication is not performed.
  • the wireless power transmitter in the above-described embodiments according to FIGS. 16 to 36 corresponds to the wireless power transmitter or the wireless power transmitter or the power transmitter disclosed in FIGS. 1 to 15 . Accordingly, the operation of the wireless power transmitter in this embodiment is implemented by one or a combination of two or more of the respective components of the wireless power transmitter in FIGS. 1 to 15 . For example, transmission/reception of a message may be performed by the communication/control unit 120 .
  • the wireless power receiver in the embodiments according to FIGS. 16 to 36 corresponds to the wireless power receiver or the wireless power receiver or the power receiver disclosed in FIGS. 1 to 15 . Accordingly, the operation of the wireless power receiver in this embodiment is implemented by one or a combination of two or more of the respective components of the wireless power receiver in FIGS. 1 to 15 . For example, transmission/reception of a message may be performed by the communication/control unit 220 .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

Selon un mode de réalisation, la présente invention concerne un dispositif de réception de puissance sans fil qui comprend : une unité de conversion de puissance qui sert à recevoir une puissance sans fil d'un dispositif de transmission de puissance sans fil par couplage magnétique avec le dispositif de transmission de puissance sans fil à une fréquence de fonctionnement ; et une unité de communication/commande qui communique avec le dispositif de transmission de puissance sans fil par communication dans la bande au moyen de la fréquence de fonctionnement, et qui communique avec le dispositif de transmission de puissance sans fil ou avec un appareil tiers par communication hors de la bande au moyen d'une fréquence autre que la fréquence de fonctionnement. L'unité de communication/commande distribue un message reçu du dispositif de transmission de puissance sans fil à l'appareil tiers, et reçoit un message de réponse au message de l'appareil tiers.
PCT/KR2020/004626 2020-04-06 2020-04-06 Dispositif de réception de puissance sans fil et dispositif de transmission de puissance sans fil WO2021206186A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/KR2020/004626 WO2021206186A1 (fr) 2020-04-06 2020-04-06 Dispositif de réception de puissance sans fil et dispositif de transmission de puissance sans fil

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/KR2020/004626 WO2021206186A1 (fr) 2020-04-06 2020-04-06 Dispositif de réception de puissance sans fil et dispositif de transmission de puissance sans fil

Publications (1)

Publication Number Publication Date
WO2021206186A1 true WO2021206186A1 (fr) 2021-10-14

Family

ID=78023370

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2020/004626 WO2021206186A1 (fr) 2020-04-06 2020-04-06 Dispositif de réception de puissance sans fil et dispositif de transmission de puissance sans fil

Country Status (1)

Country Link
WO (1) WO2021206186A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160050563A1 (en) * 2014-07-24 2016-02-18 Intel Corporation Secure wireless charging
KR20170034155A (ko) * 2015-09-18 2017-03-28 삼성전자주식회사 전자장치 및 전자장치의 데이터 전송 방법
KR20190006852A (ko) * 2017-07-11 2019-01-21 삼성전자주식회사 무선 충전을 위한 데이터 통신 방법 및 이를 사용하는 전자 장치
KR20190082891A (ko) * 2016-11-15 2019-07-10 엘지전자 주식회사 무선 전력 전달 방법 및 이를 위한 장치
KR20190138631A (ko) * 2017-05-01 2019-12-13 엘지전자 주식회사 무선전력 전송시스템에서 인증을 수행하는 장치 및 방법

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160050563A1 (en) * 2014-07-24 2016-02-18 Intel Corporation Secure wireless charging
KR20170034155A (ko) * 2015-09-18 2017-03-28 삼성전자주식회사 전자장치 및 전자장치의 데이터 전송 방법
KR20190082891A (ko) * 2016-11-15 2019-07-10 엘지전자 주식회사 무선 전력 전달 방법 및 이를 위한 장치
KR20190138631A (ko) * 2017-05-01 2019-12-13 엘지전자 주식회사 무선전력 전송시스템에서 인증을 수행하는 장치 및 방법
KR20190006852A (ko) * 2017-07-11 2019-01-21 삼성전자주식회사 무선 충전을 위한 데이터 통신 방법 및 이를 사용하는 전자 장치

Similar Documents

Publication Publication Date Title
WO2020197267A1 (fr) Dispositif et procédé permettant d'exécuter une correction de puissance dans un système de transmission de puissance sans fil
WO2020017859A1 (fr) Appareil et procédé de prise en charge d'une communication hétérogène dans un système d'émission de puissance sans fil
WO2020222528A1 (fr) Récepteur d'énergie sans fil, émetteur d'énergie sans fil et procédé de transfert d'énergie sans fil les mettant en œuvre
WO2020213958A1 (fr) Dispositif et procédé permettant une communication hors bande dans un dispositif de charge sans fil, procédé et système
WO2019194524A1 (fr) Dispositif et procédé de commande de transmission d'énergie dans un système de transmission d'énergie sans fil
WO2020085614A1 (fr) Procédé et dispositif pour transmettre des données dans un système de transmission d'énergie sans fil
WO2020149492A1 (fr) Dispositif et procédé de transfert d'énergie sans fil à de multiples dispositifs en utilisant une bobine multiple
WO2021177726A2 (fr) Dispositif de transmission d'énergie sans fil et procédé de communication par dispositif de transmission d'énergie sans fil
WO2020004940A1 (fr) Dispositif et procédé de transmission ou de réception de données dans un système de transmission d'énergie sans fil
WO2020130265A1 (fr) Dispositif et procédé pour effectuer un transfert d'énergie sans fil sur la base d'une communication hétérogène
WO2020222415A1 (fr) Dispositif de charge sans fil, procédé et système de négociation de classe d'énergie par utilisation de communication sans fil à courte portée
WO2020185051A1 (fr) Dispositif et procédé de réception de charge sans fil compatible à faible puissance et moyenne puissance
WO2020190109A1 (fr) Dispositif et procédé permettant une communication hors bande dans un dispositif de charge sans fil, procédé et système
WO2021153815A1 (fr) Appareil et procédé permettant une communication hors-bande dans des appareil, procédé et système de charge sans fil
WO2020246685A1 (fr) Procédé et dispositif de contrôle d'accès dans un système de transmission d'énergie sans fil
WO2020153586A1 (fr) Dispositif et procédé de prise en charge d'une communication hétérogène dans un système d'émission d'énergie sans fil
WO2021215793A1 (fr) Dispositif de réception d'énergie sans fil et dispositif de transmission d'énergie sans fil et
WO2021230703A1 (fr) Dispositif de réception d'énergie sans fil et procédé de communication mis en œuvre par un dispositif de réception d'énergie sans fil
WO2020218800A1 (fr) Dispositif de charge sans fil, procédé et système de mise à jour de micrologiciel
WO2021006475A1 (fr) Dispositif de transmission de puissance sans fil
WO2020171316A1 (fr) Appareil et procédé de fourniture d'informations d'état de charge dans un système de transmission d'énergie sans fil
WO2022164271A1 (fr) Procédé et dispositif pour connecter des dispositifs au moyen d'une communication bluetooth et intra-bande dans un système de transmission d'énergie sans fil
WO2022050732A1 (fr) Dispositif de transmission d'énergie sans fil, dispositif de réception d'énergie sans fil, procédé de communication par un dispositif de transmission d'énergie sans fil et procédé de communication par un dispositif de réception d'énergie sans fil
WO2022098156A1 (fr) Procédé et dispositif de protection de la confidentialité de l'utilisateur dans un système de charge sans fil par ble
WO2021235909A1 (fr) Appareil d'émission d'énergie sans fil, procédé d'émission d'énergie sans fil par appareil d'émission d'énergie sans fil, appareil de réception d'énergie sans fil et procédé de réception d'énergie sans fil par appareil de réception d'énergie sans fil

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20930417

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20930417

Country of ref document: EP

Kind code of ref document: A1