WO2024075967A1 - Procédé et dispositif de réalisation d'une recharge sans fil en mode haute puissance avec une authentification rapide dans un système de transmission d'énergie sans fil - Google Patents

Procédé et dispositif de réalisation d'une recharge sans fil en mode haute puissance avec une authentification rapide dans un système de transmission d'énergie sans fil Download PDF

Info

Publication number
WO2024075967A1
WO2024075967A1 PCT/KR2023/011730 KR2023011730W WO2024075967A1 WO 2024075967 A1 WO2024075967 A1 WO 2024075967A1 KR 2023011730 W KR2023011730 W KR 2023011730W WO 2024075967 A1 WO2024075967 A1 WO 2024075967A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless power
packet
phase
wireless
authentication
Prior art date
Application number
PCT/KR2023/011730
Other languages
English (en)
Korean (ko)
Inventor
윤진호
육경환
Original Assignee
엘지전자 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 엘지전자 주식회사 filed Critical 엘지전자 주식회사
Publication of WO2024075967A1 publication Critical patent/WO2024075967A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J50/00Circuit arrangements or systems for wireless supply or distribution of electric power
    • H02J50/10Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J50/00Circuit arrangements or systems for wireless supply or distribution of electric power
    • H02J50/80Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices

Definitions

  • This specification relates to wireless power transfer.
  • Wireless power transmission technology is a technology that transmits power wirelessly between a power source and electronic devices.
  • wireless power transmission technology allows charging the battery of a wireless terminal such as a smartphone or tablet simply by placing it on a wireless charging pad, making it more efficient than the wired charging environment using an existing wired charging connector. It can provide excellent mobility, convenience, and safety.
  • wireless power transmission technology is used in various fields such as electric vehicles, various wearable devices such as Bluetooth earphones and 3D glasses, home appliances, furniture, underground facilities, buildings, medical devices, robots, and leisure. It is attracting attention as a replacement for the existing wired power transmission environment.
  • the wireless power transmission method is also called a contactless power transmission method, a no point of contact power transmission method, or a wireless charging method.
  • the wireless power transmission system includes a wireless power transmission device that supplies electrical energy through a wireless power transmission method, and a wireless power reception device that receives electrical energy supplied wirelessly from the wireless power transmission device and supplies power to power receiving devices such as battery cells. It can be configured as a device.
  • Wireless power transmission technology includes a method of transmitting power through magnetic coupling, a method of transmitting power through radio frequency (RF), a method of transmitting power through microwaves, and ultrasonic waves.
  • RF radio frequency
  • Methods based on magnetic coupling are further classified into magnetic induction and magnetic resonance methods.
  • the magnetic induction method is a method of transmitting energy using the current induced in the receiving coil due to the magnetic field generated by the transmitting coil battery cell according to electromagnetic coupling between the coil on the transmitting side and the coil on the receiving side.
  • the magnetic resonance method is similar to the magnetic induction method in that it uses a magnetic field.
  • resonance occurs when a specific resonance frequency is applied to the coil on the transmitting side and the coil on the receiving side, which causes energy to be transferred by the phenomenon of concentrated magnetic fields on both the transmitting and receiving sides. It is different from self-induction.
  • the wireless power receiver transmits a CFG (Configuration) packet to the wireless power transmitter in the configuration phase.
  • the wireless power receiver enters a negotiation phase with the wireless power transmitter based on the CFG packet.
  • the wireless power receiver enters the high power mode by performing authentication in the power transfer phase after the negotiation phase.
  • the wireless power receiver may re-enter the configuration phase, the negotiation phase, and the power transfer phase.
  • the wireless power receiver may transmit a General Request (GRQ) packet to the wireless power transmitter.
  • the wireless power receiver may receive an Auth packet in response to the GRQ packet from the wireless power transmitter.
  • GRQ General Request
  • the wireless power receiver may re-enter the high power mode without performing the authentication in the re-entry power transfer phase.
  • this embodiment provides a method of performing quick authentication through confirmation of previously authenticated information by exchanging simple information in the negotiation phase (or power transfer phase) when the authenticated wireless device enters recharging. suggest.
  • it is possible to quickly authenticate the product and enter high-speed charging, and it is possible to authenticate the wireless device before entering the power transfer phase of wireless charging, which has the effect of enabling rapid entry into high-speed charging.
  • FIG. 1 is a block diagram of a wireless power system 10 according to one embodiment.
  • FIG. 2 is a block diagram of a wireless power system 10 according to another embodiment.
  • Figure 3 shows examples of various electronic devices in which a wireless power transmission system is introduced.
  • Figure 4 is a block diagram of a wireless power transmission system according to one embodiment.
  • Figure 5 is a diagram showing an example of a Bluetooth communication architecture to which an embodiment according to the present specification can be applied.
  • Figure 6 is a block diagram showing a wireless power transmission system using BLE communication according to an example.
  • Figure 7 is a block diagram showing a wireless power transmission system using BLE communication according to another example.
  • Figure 8 is a state transition diagram for explaining the wireless power transfer procedure.
  • Figure 9 schematically shows an example of the protocol of the ping phase 810.
  • Figure 10 schematically shows an example of the protocol of the configuration phase 820.
  • FIG. 11 is a diagram illustrating a message field of a configuration packet (CFG) of a wireless power reception device according to an embodiment.
  • CFG configuration packet
  • Figure 12 is a flowchart schematically illustrating a protocol of a negotiation stage or a renegotiation stage according to an embodiment.
  • FIG. 13 is a diagram illustrating a message field of a capability packet (CAP) of a wireless power transmission device according to an embodiment.
  • CAP capability packet
  • Figure 14 schematically shows a flowchart of the data flow for the power transfer phase 840 in the baseline protocol.
  • Figure 15 schematically shows a flowchart of the data flow for the power transfer phase 840 in the extended protocol.
  • FIG. 16 illustrates an application-level data stream between the wireless power transmitter 100 and the wireless power receiver 200 according to an example.
  • Figure 17 shows a power control control method according to one embodiment.
  • Figure 18 schematically shows the structure of an MPP ID packet.
  • Figure 19 schematically shows an example of an XID packet in MPP.
  • Figure 20 schematically shows the protocol in MPP restricted mode.
  • FIGS 21 and 22 schematically show the protocol in MPP full mode.
  • Figure 23 shows an example of an authentication message header.
  • Figure 24 shows an example of the authentication protocol version field.
  • Figure 25 shows an example of the message type field for an authentication request.
  • Figure 26 shows an example of the message type field for an authentication response.
  • Figure 27 shows an example of GET_DIGESTS.
  • Figure 28 shows an example of GET_CERTIFICATE.
  • Figure 29 shows an example of CHALLENGE.
  • Figure 30 shows an example of DIGESTS.
  • Figure 31 shows an example of CERTIFICATE.
  • Figure 32 shows an example of CHALLENGE_AUTH.
  • Figure 33 shows an example of ERROR.
  • Figure 34 is a flowchart of a method for transmitting wireless power, according to an embodiment of the present specification.
  • Figure 35 shows problems that may occur in existing technology when charging is stopped due to detection of foreign substances, etc.
  • Figure 36 shows an example of performing Fast Authentication through SRQ/auth of PRx.
  • Figure 37 shows an example of re-entry into High power mode through Fast Authentication in Negotiation.
  • Figure 38 shows an example of performing Fast Authentication through GRQ/Auth packet.
  • Figure 39 shows another example of re-entry into high power mode through fast authentication in negotiation.
  • Figure 40 shows an example of performing Fast Authentication through GRQ/Auth packet.
  • Figure 41 shows an example of re-entering high power mode through Fast Authentication in the power transfer phase.
  • Figure 42 is a flowchart of a method of re-entering the fast power mode through fast authentication from the perspective of a wireless power transmitter, according to an embodiment of the present specification.
  • Figure 43 is a flowchart of a method of re-entering the fast power mode through fast authentication from the perspective of a wireless power receiver, according to an embodiment of the present specification.
  • a or B may mean “only A,” “only B,” or “both A and B.” In other words, in this specification, “A or B” may be interpreted as “A and/or B.”
  • A, B or C means “only A,” “only B,” “only C,” or “any and all combinations of A, B, and C ( It can mean “any combination of A, B and C)”.
  • the slash (/) or comma used in this specification may mean “and/or.”
  • A/B can mean “A and/or B.”
  • A/B can mean “only A,” “only B,” or “both A and B.”
  • A, B, C can mean “A, B, or C.”
  • At least one of A and B may mean “only A,” “only B,” or “both A and B.”
  • the expression “at least one of A or B” or “at least one of A and/or B” means “at least one It can be interpreted the same as “at least one of A and B.”
  • At least one of A, B and C means “only A”, “only B”, “only C”, or “A, B and C”. It can mean “any combination of A, B and C.”
  • at least one of A, B or C” or “at least one of A, B and/or C” means It may mean “at least one of A, B and C.”
  • control information may be proposed as an example of “control information.”
  • control information in this specification is not limited to “PDCCH,” and “PDCCH” may be proposed as an example of “control information.”
  • PDCCH control information
  • wireless power refers to any form of electric field, magnetic field, electromagnetic field, etc. transmitted from a wireless power transmitter to a wireless power receiver without the use of physical electromagnetic conductors. It is used to mean the energy of.
  • Wireless power may also be called a wireless power signal, and may refer to an oscillating magnetic flux enclosed by a primary coil and a secondary coil. Described herein is power conversion in a system for wirelessly charging devices including, for example, mobile phones, cordless phones, iPods, MP3 players, headsets, etc.
  • the basic principles of wireless power transmission include, for example, a method of transmitting power through magnetic coupling, a method of transmitting power through radio frequency (RF), and a method of transmitting power through microwaves. ) and methods of transmitting power through ultrasonic waves.
  • RF radio frequency
  • FIG. 1 is a block diagram of a wireless power system 10 according to one embodiment.
  • the wireless power system 10 includes a wireless power transmission device 100 and a wireless power reception device 200.
  • the wireless power transmission device 100 receives power from an external power source (S) and generates a magnetic field.
  • the wireless power receiving device 200 receives power wirelessly by generating current using the generated magnetic field.
  • the wireless power transmission device 100 and the wireless power reception device 200 can transmit and receive various information necessary for wireless power transmission.
  • communication between the wireless power transmission device 100 and the wireless power reception device 200 is in-band communication using the magnetic field used for wireless power transmission or out-band communication using a separate communication carrier. It can be performed according to any one of (out-band communication) methods. Out-of-band communication may also be called out-of-band communication. Below, the terms are unified and described as out-band communication. Examples of out-band communication may include NFC, Bluetooth, BLE (bluetooth low energy), etc.
  • the wireless power transmission device 100 may be provided as a fixed or mobile type.
  • fixed types include those embedded in indoor ceilings, walls, or furniture such as tables, those installed as implants in outdoor parking lots, bus stops, or subway stations, or those installed in transportation vehicles such as cars or trains.
  • the mobile wireless power transmission device 100 may be implemented as part of another device, such as a mobile device of movable weight or size or the cover of a laptop computer.
  • the wireless power receiving device 200 should be interpreted as a comprehensive concept that includes various electronic devices equipped with batteries and various home appliances that are driven by receiving power wirelessly instead of a power cable.
  • Representative examples of the wireless power receiving device 200 include portable terminals, cellular phones, smart phones, personal digital assistants (PDAs), and portable media players (PMPs).
  • FIG. 2 is a block diagram of a wireless power system 10 according to another embodiment.
  • the wireless power transmission device 100 and the wireless power reception device 200 are expressed as exchanging power on a one-to-one basis.
  • one wireless power transmission device 100 can be connected to a plurality of wireless power reception devices. It is also possible to transmit power in (200-1, 200-2,..., 200-M).
  • one wireless power transmission device 100 uses a simultaneous transmission method or a time-division transmission method to simultaneously transmit multiple wireless power reception devices 200-1, 200-2, ...,200-M) can transmit power.
  • Figure 1 shows the wireless power transmission device 100 directly transmitting power to the wireless power reception device 200, but there is a wireless power transmission between the wireless power transmission device 100 and the wireless power reception device 200.
  • a separate wireless power transmission and reception device such as a relay or repeater, may be provided to increase the power transmission distance. In this case, power is transferred from the wireless power transmission device 100 to the wireless power transmission and reception device, and the wireless power transmission and reception device may then transfer power back to the wireless power reception device 200.
  • the wireless power receiver, power receiver, and receiver mentioned in this specification refer to the wireless power reception device 200. Additionally, the wireless power transmitter, power transmitter, and transmitter mentioned in this specification refer to the wireless power reception and transmission device 100.
  • Figure 3 shows examples of various electronic devices in which a wireless power transmission system is introduced.
  • FIG. 3 shows electronic devices classified according to the amount of power transmitted and received in the wireless power transmission system.
  • wearable devices such as smart watch, smart glass, HMD (Head Mounted Display), and smart ring, as well as earphones, remote controls, smartphones, PDAs, and tablets.
  • a low-power (about 5W or less or about 20W or less) wireless charging method can be applied to mobile electronic devices (or portable electronic devices) such as PCs.
  • a medium-power (approximately 50W or less or approximately 200W or less) wireless charging method can be applied to small and medium-sized home appliances such as laptops, robot vacuum cleaners, TVs, audio devices, vacuum cleaners, and monitors.
  • Kitchen appliances such as blenders, microwave ovens, and electric rice cookers, and personal mobility devices (or electronic devices/means of transportation) such as wheelchairs, electric kickboards, electric bicycles, and electric cars require high power (approximately 2 kW or less or 22 kW or less).
  • a wireless charging method may be applied.
  • the electronic devices/mobile means described above may each include a wireless power receiver to be described later. Accordingly, the above-described electronic devices/means of transportation can be charged by wirelessly receiving power from a wireless power transmitter.
  • WPC wireless power consortium
  • AFA air fuel alliance
  • PMA power matters alliance
  • WPC consists of the Qi ecosystem targeting mobile and wearable devices and the HI ecosystem targeting kitchen appliances, robots, and LEV (light electric vehicles).
  • a variety of wireless power transmitters and receivers using different power levels are covered by standards within each ecosystem and can be classified into different power classes or categories.
  • the Qi standard (belong to the Qi ecosystem) defines the baseline power profile (BPP), extended power profile (EPP), and magnetic power profile.
  • BPP relates to wireless power transmitting and receiving devices that support power transmission of 5W
  • EPP and MPP relate to wireless power transmitting and receiving devices that support power transmission in a range greater than 5W and less than 15W.
  • IB In-band
  • OB out-band
  • the wireless power receiving device can identify whether OB is supported by setting the OB flag in the configuration packet.
  • the wireless power transmitter supporting OB can enter the OB handover phase by transmitting a bit-pattern for OB handover in response to the configuration packet.
  • the response to the configuration packet may be NAK, ND, or a newly defined 8-bit pattern.
  • Applications of Qi spec include smartphones.
  • the IND standard (belong to HI ecosystem) relates to wireless power transmission and reception devices that provide guaranteed power of 30W to 150W.
  • IB and OB communication channels can be used for mutual information exchange and power control.
  • Applications to the IND spec include robots and power tools.
  • the LEV standard (belong to HI ecosystem) relates to wireless power transmission and reception devices that provide guaranteed power of 100W to 500W.
  • IB is an essential communication channel for LEV spec, and OB communication can also be used. IB can be used as initialization and link establishment to OB.
  • the wireless power transmitter can enter the OB handover phase using a bit pattern for OB handover.
  • the Ki standard (belong to HI ecosystem) is about wireless power transmitting and receiving devices that provide guaranteed power of 200W to 2kW, and essentially uses OB communication channels such as NFC or BLE.
  • the applications include kitchen appliances.
  • Wireless power transmission and reception devices can provide a very convenient user experience and interface (UX/UI).
  • UX/UI user experience and interface
  • a smart wireless charging service can be provided.
  • the smart wireless charging service can be implemented based on the UX/UI of a smartphone including a wireless power transmission device.
  • the interface between the smartphone's processor and the wireless charging receiver allows for "drop and play" two-way communication between the wireless power transmitter and receiver.
  • a user can experience a smart wireless charging service in a hotel.
  • the wireless charger transmits wireless power to the smartphone, and the smartphone receives wireless power.
  • the wireless charger transmits information about the smart wireless charging service to the smartphone.
  • the smartphone detects that it is placed on a wireless charger, detects reception of wireless power, or when the smartphone receives information about the smart wireless charging service from the wireless charger, the smartphone asks the user to consent to additional features ( Enters the state of inquiring about opt-in.
  • the smartphone can display a message on the screen with or without an alarm sound.
  • An example of a message may include phrases such as "Welcome to ### hotel.
  • the smartphone receives the user's input of selecting Yes or No Thanks and performs the next procedure selected by the user. If Yes is selected, the smartphone transmits the information to the wireless charger. And the smartphone and wireless charger perform the smart charging function together.
  • Smart wireless charging service may also include receiving auto-filled WiFi credentials.
  • a wireless charger transmits WiFi credentials to a smartphone, and the smartphone runs the appropriate app and automatically enters the WiFi credentials received from the wireless charger.
  • Smart wireless charging service may also include running a hotel application that provides hotel promotions, remote check-in/check-out, and obtaining contact information.
  • users can experience smart wireless charging services within a vehicle.
  • the wireless charger transmits wireless power to the smartphone, and the smartphone receives wireless power.
  • the wireless charger transmits information about the smart wireless charging service to the smartphone.
  • the smartphone detects that it is placed on a wireless charger, detects receipt of wireless power, or receives information about the smart wireless charging service from the wireless charger, the smartphone verifies its identity with the user. Enter the inquiry state.
  • the smartphone automatically connects to the car via WiFi and/or Bluetooth.
  • the smartphone can display the message on the screen with or without an alarm sound.
  • An example of a message may include phrases such as "Welcome to your car. Select "Yes" to synch device with in-car controls: Yes
  • the smartphone receives the user's input of selecting Yes or No Thanks and performs the next procedure selected by the user. If Yes is selected, the smartphone transmits the information to the wireless charger.
  • the smartphone and wireless charger can perform in-vehicle smart control functions together by running the in-vehicle application/display software. Users can enjoy the music they want and check regular map locations.
  • In-vehicle application/display software may include the capability to provide synchronized access for pedestrians.
  • users can experience smart wireless charging at home.
  • the wireless charger transmits wireless power to the smartphone, and the smartphone receives wireless power.
  • the wireless charger transmits information about the smart wireless charging service to the smartphone.
  • the smartphone detects that it is placed on a wireless charger, detects reception of wireless power, or when the smartphone receives information about the smart wireless charging service from the wireless charger, the smartphone asks the user to consent to additional features ( Enters the state of inquiring about opt-in.
  • the smartphone can display a message on the screen with or without an alarm sound.
  • An example of a message may include phrases such as "Hi xxx, Would you like to activate night mode and secure the building?: Yes
  • the smartphone receives the user's input of selecting Yes or No Thanks and performs the next procedure selected by the user. If Yes is selected, the smartphone transmits the information to the wireless charger. Smartphones and wireless chargers can at least recognize user patterns and encourage users to lock doors and windows, turn off lights, or set alarms.
  • 'profile' will be newly defined as an indicator/standard that represents/indicates compatibility.
  • compatibility is maintained between wireless power transmission and reception devices with the same 'profile', enabling stable power transmission and reception, but it can be interpreted that power transmission and reception is not possible between wireless power transmission and reception devices with different 'profiles'.
  • Profiles can be defined independently (or independently) of the ecosystem based on compatibility and/or application.
  • Profiles can be broadly divided into four categories: i) mobile, ii) robot, iii) kitchen, and iv) LEV.
  • Qi spec, communication protocol/method can be defined as IB and OB
  • operating frequency can be defined as 87 ⁇ 205kHz, 300 ⁇ 400kHz
  • applications include smartphones, laptops, wearables, etc. It can exist.
  • IND spec communication protocol/method may include IB and OB, and examples of applications may include robots and electric tools.
  • Ki spec communication protocol/method can be defined as NFC or BLE-based, operating frequency can be defined as less than 100kHz, and examples of applications can include kitchen/home appliances, etc.
  • LEV spec may include IB and OB
  • applications may include electric bicycles and electric kickboards.
  • NFC or BLE communication can be used as an OB communication channel between the wireless power transmitter and receiver of the above profile.
  • the wireless power transmitter and receiver can mutually confirm that they are NFC devices by exchanging WPC NDEF (NFC Data Exchange Profile Format).
  • Figure 4 is a block diagram of a wireless power transmission system according to one embodiment.
  • the wireless power transmission system 10 includes a mobile device 450 that wirelessly receives power and a base station 400 that transmits power wirelessly.
  • the base station 400 is a device that provides induced power or resonance power and may include at least one wireless power transmitter (100) and a system circuit 405.
  • the wireless power transmitter 100 can transmit induced power or resonance power and control the transmission.
  • the wireless power transmitter 100 includes a power conversion circuit 110 that converts electrical energy into a power signal by generating a magnetic field through a primary coil(s) and transmits power at an appropriate level. It may include a communication/control circuit (communications & control circuit, 120) that controls communication and power transfer with the wireless power receiver 200.
  • the system circuit 405 may perform other operational controls of the base station 400, such as input power provisioning, control of a plurality of wireless power transmitters, and user interface control.
  • the primary coil can generate an electromagnetic field using alternating current power (or voltage or current).
  • the primary coil may receive alternating current power (or voltage or current) of a specific frequency output from the power conversion circuit 110, and thereby generate a magnetic field of a specific frequency.
  • the magnetic field may be generated in a non-radiative or radial form, and the wireless power receiving device 200 receives it and generates current. In other words, the primary coil transmits power wirelessly.
  • the primary and secondary coils may have any suitable shapes, for example copper wire wound around a high permeability formation such as ferrite or amorphous metal.
  • the primary coil may also be called a transmitting coil, primary core, primary winding, primary loop antenna, etc.
  • the secondary coil may also be called a receiving coil, secondary core, secondary winding, secondary loop antenna, pickup antenna, etc. .
  • the primary coil and secondary coil may be provided in the form of a primary resonance antenna and a secondary resonance antenna, respectively.
  • a resonant antenna may have a resonant structure including a coil and a capacitor.
  • the resonant frequency of the resonant antenna is determined by the inductance of the coil and the capacitance of the capacitor.
  • the coil may be in the form of a loop.
  • a core may be placed inside the loop.
  • the core may include a physical core such as a ferrite core or an air core.
  • the resonance phenomenon refers to a phenomenon in which when a near field corresponding to the resonance frequency is generated in one resonant antenna and another resonant antenna is located nearby, both resonant antennas are coupled to each other, resulting in highly efficient energy transfer between the resonant antennas. .
  • the primary resonance antenna and the secondary resonance antenna resonate with each other, and accordingly, in general, the magnetic field generated from the primary resonance antenna
  • the magnetic field is focused toward the secondary resonant antenna with higher efficiency compared to the case where it is radiated into free space, and thus energy can be transferred from the primary resonant antenna to the secondary resonant antenna with high efficiency.
  • the magnetic induction method can be implemented similarly to the magnetic resonance method, but in this case, the frequency of the magnetic field does not need to be the resonance frequency. Instead, the magnetic induction method requires matching between the loops that make up the primary and secondary coils, and the gap between the loops must be very close.
  • the wireless power transmitter 100 may further include a communication antenna.
  • a communication antenna can transmit and receive communication signals using a communication carrier other than magnetic field communication.
  • a communication antenna can transmit and receive communication signals such as Wi-Fi, Bluetooth, Bluetooth LE, ZigBee, and NFC.
  • the communication/control circuit 120 can transmit and receive information with the wireless power reception device 200.
  • the communication/control circuit 120 may include at least one of an IB communication module or an OB communication module.
  • the IB communication module can transmit and receive information using magnetic waves with a specific frequency as the center frequency.
  • the communication/control circuit 120 performs in-band communication by carrying communication information at the operating frequency of wireless power transmission and transmitting it through the primary coil, or by receiving the operating frequency containing the information through the primary coil. can do.
  • modulation methods such as binary phase shift keying (BPSK), frequency shift keying (FSK), or amplitude shift keying (ASK) and Manchester coding or non-zero return level (NZR) are used.
  • BPSK binary phase shift keying
  • FSK frequency shift keying
  • ASK amplitude shift keying
  • NZR non-zero return level
  • coding methods such as -L: non-return-to-zero level (L) coding, information can be stored in magnetic waves or magnetic waves containing information can be interpreted.
  • the communication/control circuit 120 can transmit and receive information up to a distance of several meters at a data transmission rate of several kbps.
  • the OB communication module may perform out-band communication through a communication antenna.
  • the communication/control circuit 120 may be provided as a short-range communication module.
  • Examples of short-range communication modules include communication modules such as Wi-Fi, Bluetooth, Bluetooth LE, ZigBee, and NFC.
  • the communication/control circuit 120 may control the overall operation of the wireless power transmission device 100.
  • the communication/control circuit 120 can perform computation and processing of various information and control each component of the wireless power transmission device 100.
  • the communication/control circuit 120 may be implemented in a computer or similar device using hardware, software, or a combination thereof.
  • the communication/control circuit 120 may be provided in the form of an electronic circuit that processes electrical signals to perform a control function, and in software, it may be provided in the form of a program that drives the hardware communication/control circuit 120. can be provided.
  • the communication/control circuit 120 can control transmission power by controlling the operating point.
  • the operating point being controlled may correspond to a combination of frequency (or phase), duty cycle, duty ratio, and voltage amplitude.
  • the communication/control circuit 120 may control transmission power by adjusting at least one of frequency (or phase), duty cycle, duty ratio, and voltage amplitude.
  • the wireless power transmitter 100 may supply constant power
  • the wireless power receiver 200 may control received power by controlling the resonance frequency.
  • the wireless power transmitter 100 can be classified, for example, in terms of the number of primary coils activated for power transmission.
  • the wireless power transmitter 100 supporting a wireless power transmission amount of up to 5W is, for example, a type A wireless power transmitter 100 and a type A wireless power transmitter 100.
  • B type B wireless power transmitters 100
  • supports a wireless power transmission amount of 5W or more i.e., a wireless power transmitter 100 that supports the MPP or EPP protocol.
  • it can be classified into a type MP-A (MP-A) wireless power transmitter 100 and a type MP-B (type MP-B) wireless power transmitter 100.
  • Type A and Type MP A wireless power transmitters 100 may have one or more primary coils.
  • Type A and Type MP A wireless power transmitters 100 activate a single primary coil at a time, so a single primary cell matching the activated primary coil can be used.
  • Type B and Type MP B power transmitters may have a primary coil array. And Type B and Type MP B power transmitters can enable free positioning. To this end, Type B and Type MP B power transmitters can activate one or more primary coils in the array to realize primary cells at different locations on the interface surface.
  • a wireless power transmitter that utilizes magnets and supports wireless power transmission of 5W or more i.e., a wireless power transmitter that supports the MPP protocol
  • a wireless power transmitter that supports the MPP protocol can be proposed, and the MPP protocol will be described later.
  • BPP supports power of up to 5W
  • EPP supports power of more than 5W and less than 50W
  • MPP supports power of more than 5W and less than 50W. You can. In other words, EPP or MPP can be considered to support power of 5 ⁇ 50W.
  • the mobile device 450 receives and stores the power received from the wireless power receiver 200 and a wireless power receiver 200 that receives wireless power through a secondary coil, and supplies it to the device. Includes load (455).
  • the wireless power receiver 200 may include a power pick-up circuit (210) and a communications/control circuit (220).
  • the power pickup circuit 210 may receive wireless power through the secondary coil and convert it into electrical energy.
  • the power pickup circuit 210 rectifies the alternating current signal obtained through the secondary coil and converts it into a direct current signal.
  • the communication/control circuit 220 can control transmission and reception of wireless power (power transmission and reception).
  • the secondary coil may receive wireless power transmitted from the wireless power transmission device 100.
  • the secondary coil can receive power using the magnetic field generated by the primary coil.
  • a specific frequency is the resonance frequency
  • a self-resonance phenomenon occurs between the primary coil and the secondary coil, allowing power to be transmitted more efficiently.
  • the communication/control circuit 220 may further include a communication antenna.
  • a communication antenna can transmit and receive communication signals using a communication carrier other than magnetic field communication.
  • a communication antenna can transmit and receive communication signals such as Wi-Fi, Bluetooth, Bluetooth LE, ZigBee, and NFC.
  • the communication/control circuit 220 can transmit and receive information with the wireless power transmission device 100.
  • the communication/control circuit 220 may include at least one of an IB communication module or an OB communication module.
  • the IB communication module can transmit and receive information using magnetic waves with a specific frequency as the center frequency.
  • the communication/control circuit 220 can perform IB communication by carrying information in magnetic waves and transmitting it through a secondary coil, or by receiving magnetic waves containing information through a secondary coil.
  • modulation methods such as binary phase shift keying (BPSK), frequency shift keying (FSK), or amplitude shift keying (ASK) and Manchester coding or non-zero return level (NZR) are used.
  • BPSK binary phase shift keying
  • FSK frequency shift keying
  • ASK amplitude shift keying
  • NZR non-zero return level
  • coding methods such as -L: non-return-to-zero level (L) coding, information can be stored in magnetic waves or magnetic waves containing information can be interpreted.
  • the communication/control circuit 220 can transmit and receive information up to a distance of several meters at a data transmission rate of several kbps.
  • the OB communication module may perform out-band communication through a communication antenna.
  • the communication/control circuit 220 may be provided as a short-range communication module.
  • Examples of short-range communication modules include communication modules such as Wi-Fi, Bluetooth, Bluetooth LE, ZigBee, and NFC.
  • the communication/control circuit 220 may control the overall operation of the wireless power reception device 200.
  • the communication/control circuit 220 can perform computation and processing of various information and control each component of the wireless power reception device 200.
  • the communication/control circuit 220 may be implemented in a computer or similar device using hardware, software, or a combination thereof.
  • the communication/control circuit 220 may be provided in the form of an electronic circuit that processes electrical signals to perform a control function, and in software, it may be provided in the form of a program that drives the hardware communication/control circuit 220. can be provided.
  • the communication/control circuit 120 and the communication/control circuit 220 are an OB communication module or a short-range communication module that is Bluetooth or Bluetooth LE, the communication/control circuit 120 and the communication/control circuit 220 are shown in Figure 5, respectively. It can be implemented and operate with the same communication architecture.
  • Figure 5 is a diagram showing an example of a Bluetooth communication architecture to which an embodiment according to the present specification can be applied.
  • FIG. 5 shows an example of a Bluetooth Basic Rate (BR)/Enhanced Data Rate (EDR) protocol stack supporting GATT, and (b) shows an example of a protocol stack of Bluetooth Low Energy (LE). Shows an example of a protocol stack.
  • BR Bluetooth Basic Rate
  • EDR Enhanced Data Rate
  • LE Bluetooth Low Energy
  • the Bluetooth BR/EDR protocol stack consists of an upper controller stack (Controller stack) 460 and a lower one based on the Host Controller Interface (HCI) 18. May include a host stack (Host Stack, 470).
  • the host stack (or host module) 470 refers to a wireless transmitting and receiving module that receives a 2.4 GHz Bluetooth signal and hardware for transmitting or receiving Bluetooth packets, and the controller stack 460 is connected to the Bluetooth module and operates the Bluetooth module. Control and perform actions.
  • the host stack 470 may include a BR/EDR PHY layer 12, a BR/EDR Baseband layer 14, and a Link Manager layer (Link Manager) 16.
  • the BR/EDR PHY layer 12 is a layer that transmits and receives 2.4GHz wireless signals, and when using GFSK (Gaussian Frequency Shift Keying) modulation, data can be transmitted by hopping 79 RF channels.
  • GFSK Gausian Frequency Shift Keying
  • the BR/EDR Baseband layer 14 is responsible for transmitting digital signals, selects a channel sequence that hops 1400 times per second, and transmits a time slot of 625us for each channel.
  • the link manager layer 16 uses the Link Manager Protocol (LMP) to control the overall operation (link setup, control, security) of the Bluetooth connection.
  • LMP Link Manager Protocol
  • the link manager layer 16 can perform the following functions.
  • the host controller interface layer 18 provides an interface between the host module and the controller module, allowing the host to provide commands and data to the controller, and allows the controller to provide events and data to the host.
  • the host stack (or host module, 20) includes Logical Link Control and Adaptation Protocol (L2CAP, 21), Attribute Protocol (Protocol, 22), Generic Attribute Profile (GATT, 23), and Generic Access Profile (Generic Access). Includes Profile, GAP, 24), and BR/EDR Profile (25).
  • the Logical Link Control and Adaptation Protocol (L2CAP, 21) can provide a bidirectional channel for transmitting data to a specific protocol or profile.
  • the L2CAP 21 is capable of multiplexing various protocols, profiles, etc. provided by Bluetooth.
  • L2CAP of Bluetooth BR/EDR uses dynamic channels, supports protocol service multiplexer, retransmission, and streaming mode, and provides segmentation and reassembly, per-channel flow control, and error control.
  • the general attribute profile may be operable as a protocol that describes how the attribute protocol 22 is used when configuring services.
  • the generic attribute profile 23 may be operable to specify how ATT attributes are grouped together into services and may be operable to describe characteristics associated with services.
  • the general attribute profile 23 and the attribute protocol ATT 22 may use features to describe the state and services of the device, how the features relate to each other and how they are used.
  • the attribute protocol 22 and the BR/EDR profile 25 define a service (profile) using Bluetooth BR/EDR and an application protocol for exchanging these data, and the general access profile (Generic Access Profile, GAP, 24) defines device discovery, connection, and security levels.
  • GAP Global System for Mobile communications
  • the Bluetooth LE protocol stack includes a controller stack (480) operable to process a timing-critical wireless device interface and a host stack operable to process high level data. Includes (Host stack, 490).
  • the controller stack 480 may be implemented using a communication module that may include a Bluetooth wireless device and a processor module that may include a processing device, such as a microprocessor.
  • Host stack 490 may be implemented as part of an OS running on a processor module, or as an instantiation of a package on an OS.
  • controller stack and host stack may operate or execute on the same processing device within a processor module.
  • the controller stack 480 includes a physical layer (PHY) 32, a link layer (Link Layer) 34, and a host controller interface (Host Controller Interface) 36.
  • PHY physical layer
  • Link Layer Link Layer
  • Hos Controller Interface host controller interface
  • the physical layer (PHY, wireless transmission/reception module, 32) is a layer that transmits and receives 2.4 GHz wireless signals and uses GFSK (Gaussian Frequency Shift Keying) modulation and a frequency hopping technique consisting of 40 RF channels.
  • GFSK Gausian Frequency Shift Keying
  • the link layer 34 which plays a role in transmitting or receiving Bluetooth packets, performs advertising and scanning functions using three advertising channels, then creates a connection between devices and transmits data packets of up to 257 bytes through 37 data channels. Provides the function of sending and receiving.
  • the host stack includes GAP (Generic Access Profile, 40), Logical Link Control and Adaptation Protocol (L2CAP, 41), Security Manager (SM, 42), Attribute Protocol (ATT, 440), and General Attribute Profile. (Generic Attribute Profile, GATT, 44), Generic Access Profile (25), and LT Profile (46).
  • GAP Generic Access Profile
  • L2CAP Logical Link Control and Adaptation Protocol
  • SM Security Manager
  • ATT Attribute Protocol
  • General Attribute Profile Generic Attribute Profile, GATT, 44
  • Generic Access Profile 25
  • LT Profile 46
  • the host stack 490 is not limited to this and may include various protocols and profiles.
  • the host stack uses L2CAP to multiplex various protocols and profiles provided by Bluetooth.
  • L2CAP Logical Link Control and Adaptation Protocol, 41
  • L2CAP Logical Link Control and Adaptation Protocol, 41
  • the L2CAP 41 may be operable to multiplex data between upper layer protocols, segment and reassemble packages, and manage multicast data transmission.
  • Bluetooth LE basically uses three fixed channels (1 for signaling CH, 1 for Security Manager, and 1 for Attribute protocol). Additionally, dynamic channels can be used as needed.
  • BR/EDR Base Rate/Enhanced Data Rate
  • BR/EDR Basic Rate/Enhanced Data Rate
  • SM Security Manager
  • ATT Attribute Protocol, 43
  • ATT has the following six message types (Request, Response, Command, Notification, Indication, Confirmation).
  • the Request message is a message to request and deliver specific information from a client device to a server device
  • the Response message is a response message to the Request message and can be used to transmit from the server device to the client device.
  • Command message A message sent from a client device to a server device mainly to instruct a command for a specific operation.
  • the server device does not transmit a response to the command message to the client device.
  • Notification message A message sent from the server device to the client device for notification of events, etc., and the client device does not send a confirmation message for the Notification message to the server device.
  • Indication and Confirm message A message sent from the server device to the client device for notification of events, etc.. Unlike the Notification message, the client device transmits a confirmation message for the Indication message to the server device.
  • This specification transmits a value for the data length when requesting long data in the GATT profile using the attribute protocol (ATT, 43) so that the client can clearly know the data length, and uses UUID to obtain characteristic information from the server. Values can be transmitted.
  • the general access profile (GAP, 45) is a newly implemented layer for Bluetooth LE technology and is used to control role selection for communication between Bluetooth LE devices and how multi-profile operation occurs.
  • the general access profile 45 is mainly used in device discovery, connection creation, and security procedures, defines a method of providing information to the user, and defines the types of attributes as follows.
  • the LE profile 46 is a profile dependent on GATT and is mainly applied to Bluetooth LE devices.
  • the LE profile 46 may include, for example, Battery, Time, FindMe, Proximity, Time, etc., and the specific details of GATT-based Profiles are as follows.
  • the general attribute profile may be operable as a protocol that describes how the attribute protocol (43) is used when configuring services.
  • the generic attribute profile 44 may be operable to specify how ATT attributes are grouped together into services and may be operable to describe characteristics associated with services.
  • the general attribute profile 44 and the attribute protocol ATT 43 may use features to describe the state and services of the device, how the features relate to each other and how they are used.
  • BLE procedures can be divided into Device Filtering Procedure, Advertising Procedure, Scanning Procedure, Discovering Procedure, and Connecting Procedure.
  • the device filtering procedure is a method to reduce the number of devices that respond to requests, instructions, notifications, etc. in the controller stack.
  • the controller stack can control the power consumption in the BLE controller stack by reducing the number of requests sent.
  • An advertising device or scanning device may perform the device filtering procedure to limit devices that receive advertising packets, scan requests, or connection requests.
  • an advertising device refers to a device that transmits advertising events, that is, performs advertising, and is also expressed as an advertiser.
  • a scanning device refers to a device that performs scanning or a device that transmits a scan request.
  • a scanning device when a scanning device receives some advertising packets from an advertising device, the scanning device must send a scan request to the advertising device.
  • the scanning device may ignore advertising packets transmitted from an advertising device.
  • Device filtering procedures can also be used during the connection request process. If device filtering is used in the connection request process, there is no need to transmit a response to the connection request by ignoring the connection request.
  • the advertising device performs an advertising procedure to perform a non-directional broadcast to devices within the area.
  • undirected advertising is advertising aimed at all devices rather than broadcasting towards a specific device, and all devices scan the advertising to request additional information or You can make a connection request.
  • directed advertising allows only devices designated as receiving devices to scan advertising and request additional information or connection.
  • the advertising procedure is used to establish a Bluetooth connection with a nearby initiating device.
  • the advertising procedure may be used to provide periodic broadcasts of user data to scanning devices that are listening on the advertising channel.
  • Advertising devices may receive scan requests from listening devices that are listening to obtain additional user data from the advertising device.
  • the advertising device transmits a response to the scan request to the device that transmitted the scan request through the same advertising physical channel as the advertising physical channel that received the scan request.
  • Broadcast user data sent as part of advertisement packets is dynamic data, whereas scan response data is generally static data.
  • An advertising device may receive a connection request from an initiating device on an advertising (broadcast) physical channel. If the advertising device used a connectable advertising event and the initiating device was not filtered by the device filtering procedure, the advertising device stops advertising and enters connected mode. The advertising device may start advertising again after being in connected mode.
  • the device that performs scanning that is, the scanning device, performs a scanning procedure to listen to the non-directional broadcast of user data from advertising devices using an advertising physical channel.
  • the scanning device transmits a scan request to the advertising device through the advertising physical channel to request additional data from the advertising device.
  • the advertising device transmits a scan response, which is a response to the scan request, including additional data requested by the scanning device through the advertising physical channel.
  • the scanning procedure can be used while connecting to another BLE device in a BLE piconet.
  • the scanning device If the scanning device receives a broadcasted advertising event and is in an initiator mode that can initiate a connection request, the scanning device transmits a connection request to the advertising device through the advertising physical channel, thereby You can start a Bluetooth connection with .
  • the scanning device When the scanning device transmits a connection request to the advertising device, the scanning device stops scanning initiator mode for additional broadcasts and enters connection mode.
  • 'Bluetooth devices' Devices capable of Bluetooth communication (hereinafter referred to as 'Bluetooth devices') perform advertising and scanning procedures to discover devices existing nearby or to be discovered by other devices within a given area.
  • the discovery procedure is performed asymmetrically.
  • a Bluetooth device that tries to find other nearby devices is called a discovering device, and it listens to find devices that advertise scannable advertising events.
  • a Bluetooth device that can be discovered and used by other devices is called a discoverable device, and actively broadcasts advertising events so that other devices can scan through an advertising (broadcast) physical channel.
  • Both the discovering device and the discoverable device may already be connected to other Bluetooth devices in the piconet.
  • connection procedure is asymmetric, requiring one Bluetooth device to perform an advertising procedure while another Bluetooth device performs a scanning procedure.
  • a connection may be initiated by transmitting a connection request to the advertising device through an advertising (broadcast) physical channel.
  • the link layer enters the advertisement state according to instructions from the host (stack).
  • the link layer transmits advertising PDUs (Packet Data Circuits) in advertising events.
  • Each advertising event consists of at least one advertising PDU, and the advertising PDUs are transmitted through the advertising channel indices used.
  • the advertising event may be terminated when each advertising PDU is transmitted through the advertising channel indexes used, or the advertising event may be terminated earlier if the advertising device needs to secure space to perform other functions.
  • the link layer enters the scanning state under the direction of the host (stack). In the scanning state, the link layer listens for advertising channel indices.
  • scanning states There are two types of scanning states: passive scanning and active scanning, and each scanning type is determined by the host.
  • ScanInterval is defined as the interval between the starting points of two consecutive scan windows.
  • the link layer must listen for completion of all scan intervals of the scan window as directed by the host, provided there are no scheduling conflicts. In each scan window, the link layer must scan a different advertising channel index. The link layer uses all available advertising channel indices.
  • the link layer When passive scanning, the link layer only receives packets and does not transmit any packets.
  • the link layer When actively scanning, the link layer performs listening to the advertising device to rely on the advertising PDU type and can request additional information about the advertising device.
  • the link layer enters the initiation state under the direction of the host (stack).
  • the link layer When the link layer is in the startup state, the link layer performs listening for advertising channel indices.
  • the link layer listens for the advertising channel index during the scan window interval.
  • the link layer enters the connected state when the device performing the connection request, that is, the initiating device, transmits a CONNECT_REQ PDU to the advertising device, or when the advertising device receives the CONNECT_REQ PDU from the initiating device.
  • connection After entering the connected state, a connection is considered created. However, the connection need not be considered established at the time it enters the connected state. The only difference between a newly created connection and an established connection is the link layer connection supervision timeout value.
  • the link layer performing the master role is called the master, and the link layer performing the slave role is called the slave.
  • the master controls the timing of the connection event, and the connection event refers to the point in time when the master and slave are synchronized.
  • the Link Layer has only one packet format used for both advertising channel packets and data channel packets.
  • Each packet consists of four fields: Preamble, Access Address, PDU, and CRC.
  • the PDU When a packet is transmitted in an advertising channel, the PDU will be an advertising channel PDU, and when a packet is transmitted in a data channel, the PDU will be a data channel PDU.
  • the advertising channel PDU Packet Data Circuit
  • PDU Packet Data Circuit
  • the PDU type field of the advertising channel PDU included in the header indicates the PDU type as defined in Table 1 below.
  • the advertising channel PDU types below are called advertising PDUs and are used in specific events.
  • ADV_IND Linkable non-directional advertising event
  • ADV_DIRECT_IND Connectable directional advertising event
  • ADV_NONCONN_IND Non-directional advertising event not reachable.
  • ADV_SCAN_IND Scannable non-directional advertising events
  • the PDUs are transmitted at the link layer in the advertising state and received by the link layer in the scanning state or initiating state.
  • the advertising channel PDU type below is called a scanning PDU and is used in the conditions described below.
  • SCAN_REQ Transmitted by the link layer in the scanning state, and received by the link layer in the advertising state.
  • SCAN_RSP Transmitted by the link layer in the advertising state and received by the link layer in the scanning state.
  • the advertising channel PDU type below is called an initiating PDU.
  • CONNECT_REQ Sent by the link layer in the initiation state and received by the link layer in the advertisement state.
  • the data channel PDU has a 16-bit header, a payload of various sizes, and may include a Message Integrity Check (MIC) field.
  • MIC Message Integrity Check
  • load 455 may be a battery.
  • the battery can store energy using the power output from the power pickup circuit 210.
  • the mobile device 450 does not necessarily include a battery.
  • the battery may be provided in a detachable external configuration.
  • the wireless power receiving device 200 may include a driving means that drives various operations of the electronic device instead of a battery.
  • the mobile device 450 is shown as including a wireless power receiving device 200, and the base station 400 is shown as including a wireless power transmitting device 100, but in a broad sense, the wireless power receiving device ( 200) may be identified with the mobile device 450 and the wireless power transmission device 100 may be identified with the base station 400.
  • wireless power transmission including the communication/control circuit 120 may be represented as a simplified block diagram as shown in FIG. 6.
  • Figure 6 is a block diagram showing a wireless power transmission system using BLE communication according to an example.
  • the wireless power transmission device 100 includes a power conversion circuit 110 and a communication/control circuit 120.
  • the communication/control circuit 120 includes an in-band communication module 121 and a BLE communication module 122.
  • the wireless power receiving device 200 includes a power pickup circuit 210 and a communication/control circuit 220.
  • the communication/control circuit 220 includes an in-band communication module 221 and a BLE communication module 222.
  • the BLE communication modules 122 and 222 perform the architecture and operation according to FIG. 5 .
  • the BLE communication modules 122 and 222 may be used to establish a connection between the wireless power transmitter 100 and the wireless power receiver 200 and exchange control information and packets necessary for wireless power transmission. there is.
  • the communication/control circuit 120 may be configured to operate a profile for wireless charging.
  • the profile for wireless charging may be GATT using BLE transmission.
  • Figure 7 is a block diagram showing a wireless power transmission system using BLE communication according to another example.
  • the communication/control circuits 120 and 220 include only in-band communication modules 121 and 221, respectively, and the BLE communication modules 122 and 222 include communication/control circuits 120 and 222, respectively. 220) can also be provided separately.
  • the coil or coil unit may be referred to as a coil assembly, coil cell, or cell including a coil and at least one element adjacent to the coil.
  • the wireless power transmitter 100 and the wireless power receiver 200 communicate for the purpose of configuring and controlling power transmission. Let's begin.
  • the power signal can provide a carrier for all communications, and the protocol for communication can be composed of several steps.
  • the communication protocol will be described.
  • Figure 8 is a state transition diagram for explaining the wireless power transfer procedure.
  • WPC can define two communication protocols.
  • BPP Baseline Protocol
  • EPP Extended Protocol
  • FOD foreign object detection
  • the power transfer operation between the wireless power transmitter 100 and the wireless power receiver 200 is largely divided into a ping phase 810 and a configuration phase 820. It can be divided into (Configuration Phase), negotiation phase (830) (Negotiation Phase), and power transfer phase (Power Transfer Phase).
  • the wireless power transmitter 100 may attempt to establish communication with the wireless power receiver 200. Before attempting to establish communication, measurements may be performed to determine whether there are objects such as bank cards, coins or other metals that may be damaged or heated during power transfer. Here, these measurements can be performed without waking up the wireless power receiver 200.
  • the wireless power transmitter 100 obtains design information from the wireless power receiver 200 and then concludes whether the detected metal is a foreign object or a friendly metal in a negotiation phase. You can postpone it to (830).
  • the wireless power receiver 200 may send basic identification and configuration data to the wireless power receiver 200. And, both the wireless power transmitter 100 and the wireless power receiver 200 can use this information to create a baseline power transfer contract.
  • the wireless power transmitter 100 and the wireless power receiver 200 may determine whether to continue the baseline protocol or the extended protocol in the configuration phase 820.
  • the wireless power receiver 200 can use functions such as enhanced FOD, data transport stream, and authentication only when implementing the extended protocol.
  • the wireless power transmitter 100 and the wireless power receiver 200 may establish an extended power transfer contract that includes additional settings and restrictions. Additionally, the wireless power receiver 200 may provide design information to the wireless power transmitter 100. Later, the design information can be used to complete the FOD before transitioning to the power transfer phase 840.
  • the negotiation phase 830 may correspond to a step that does not exist in the baseline protocol.
  • the power transfer phase 840 may be a step in which power is transferred to the load of the wireless power receiver 200.
  • the wireless power transmitter 100 and the wireless power receiver 200 may perform system calibration when this step begins. This stage may occasionally be interrupted to renegotiate elements of the power transmission agreement. However, power transfer may continue during this renegotiation.
  • the wireless power transmitter 100 does not yet know whether the wireless power receiver 200 is within the operating volume. In addition, the wireless power transmitter 100 cannot recognize the wireless power receiver 200. For that reason, this system is usually disabled due to lack of power signal.
  • the wireless power transmitter 100 may go through the following steps.
  • Figure 9 schematically shows an example of the protocol of the ping phase 810.
  • the wireless power transmitter 100 can perform analog ping (S910). That is, the wireless power transmitter 100 can confirm whether an object exists in the operating volume by transmitting an analog ping. For example, a wireless power transmitter can detect whether an object exists in the operating space based on a change in current in the transmission coil or primary coil.
  • the wireless power transmitter 100 may apply NFC tag protection (S920).
  • NFC tag protection can be performed through the following procedures.
  • the wireless power transmitter 100 determines that the NFC tag cannot withstand the power signal, it does not start a digital ping and maintains the ping phase, and the wireless power transmitter 100 may inform the user of the reason why it cannot proceed. there is.
  • the wireless power transmitter 100 may detect foreign matter (S930). That is, the wireless power transmitter 100 can collect information that helps determine whether there is a foreign substance other than the wireless power receiver 200. For this purpose, the wireless power transmitter 100 can use various methods such as the free-power FOD method.
  • the radio power receiver may not operate.
  • the wireless power transmitter 100 may start a digital ping (S940).
  • the digital ping may request a response such as a signal strength (SIG) data packet or an end power transfer (EPT) data packet from the wireless power receiver 200.
  • SIG signal strength
  • EPT end power transfer
  • the wireless power transmitter 100 may receive the SIG or EPT from the wireless power receiver 200 (S950).
  • the SIG data packet may provide a measure of coupling, and the SIG data packet may include information about signal strength values.
  • the EPT data packet may provide a request to stop power transmission and a reason for the request.
  • the wireless power transmitter 100 may repeat the above steps while remaining in the ping phase 810.
  • the configuration phase 820 is part of the following protocol.
  • the wireless power receiver 200 can identify itself to the wireless power transmitter 100.
  • the wireless power receiver 200 and the wireless power transmitter 100 can establish a baseline power transfer agreement.
  • the wireless power receiver 200 and the wireless power transmitter 100 can determine the protocol variant to be used for power transmission.
  • the wireless power transmitter 100 and the wireless power receiver 200 may continue to operate using the digital ping parameter. This may mean that the power and current levels of both the wireless power transmitter 100 and the wireless power receiver 200 change only when the user moves the wireless power receiver 200 from position within the operating volume.
  • Figure 10 schematically shows an example of the protocol of the configuration phase 820.
  • the wireless power transmitter 100 may receive an identification (ID) from the wireless power receiver 200 (S1010).
  • the wireless power transmitter 100 may also receive an extended identification (XID) from the wireless power receiver 200 (S1020). That is, the wireless power receiver 200 can identify itself using an ID data packet and, optionally, an XID data packet.
  • ID identification
  • XID extended identification
  • the wireless power transmitter 100 may optionally receive a power control hold-off (PCH) data packet from the wireless power receiver 200 (S1030), and the wireless power transmitter 100 may receive CFG data from the wireless power receiver 200. Data packets can be received (S1040). That is, the wireless power receiver 200 can provide data for use in a power transfer contract using PCH and/or CFG data packets.
  • PCH power control hold-off
  • the wireless power transmitter 100 can check the extended protocol if possible (S1050).
  • the ID data packet may be information that identifies the wireless power receiver 200.
  • the ID may include a manufacturer code, basic device identifier, etc.
  • the ID may also include information that identifies the presence or absence of an XID data packet in the setup phase.
  • XID data packets may contain additional identification data.
  • the PCH data packet may configure the delay between the reception of the CE data packet and the wireless power transmitter 100 starting coil current adjustment.
  • CFG data packets can provide basic configuration data.
  • a CFG data packet can provide all parameters governing power transfer in the baseline protocol.
  • CFG data packets can provide all FSK communication parameters used in the extended protocol.
  • CFG data packets may provide additional functions of the wireless power receiver 200.
  • FIG. 11 is a diagram illustrating a message field of a configuration packet (CFG) of a wireless power reception device according to an embodiment.
  • CFG configuration packet
  • the configuration packet (CFG) may have a header value of 0x51, and the message field of the configuration packet (CFG) includes a 1-bit authentication (AI) flag and a 1-bit outband (OB). ) flags may be included.
  • AI authentication
  • OB outband
  • the authentication flag (AI) indicates whether the wireless power receiving device supports the authentication function. For example, if the value of the authentication flag (AI) is '1', it indicates that the wireless power receiving device supports the authentication function or can operate as an authentication initiator, and the value of the authentication flag (AI) is '1'. If it is '0', it may indicate that the wireless power receiving device does not support the authentication function or cannot operate as an authentication initiator.
  • the out-of-band (OB) flag indicates whether the wireless power receiving device supports out-of-band communication. For example, if the value of the out-band (OB) flag is '1', the wireless power receiving device indicates out-band communication, and if the value of the out-band (OB) flag is '0', the wireless power receiving device indicates out-band communication. You can indicate that it is not supported.
  • Provision of the ID and/or XID described above is for identification purposes. And, the provision of PCH and/or CFG is for building a power transmission contract.
  • the negotiation phase 830 is a part of an extended protocol that allows the wireless power transmitter 100 and the wireless power receiver 200 to change the power transmission contract. There are two types of this stage.
  • the negotiation phase 830 directly follows the configuration phase 820 and serves to create an initial extended power transmission contract.
  • the negotiation phase 830 also serves to complete the pre-power FOD function.
  • the length of the negotiation phase is not limited.
  • the renegotiation phase can interrupt the power transfer phase 840 multiple times and generally serves to adjust a single element of the power transfer agreement.
  • FOD/qf, FOD/rf and SRQ/rpr data packets may not be used in the renegotiation phase.
  • Constraints on CE data packets in the power transfer phase 840 limit the length of the renegotiation phase.
  • the Power Transfer Contract related to the reception/transmission of wireless power between the wireless power receiver and the wireless power transmitter is expanded or changed, or at least some of the elements of the power transfer contract are adjusted.
  • the power transmission contract may be renewed, or information may be exchanged to establish out-of-band communication.
  • Figure 12 is a flowchart schematically illustrating a protocol of a negotiation stage or a renegotiation stage according to an embodiment.
  • the wireless power transmitter 100 may receive a FOD status data packet (e.g. FOD) from the wireless power receiver 200 (S1210).
  • FOD status data packet e.g. FOD
  • the wireless power receiver 200 may use the FOD status data packet to inform the wireless power transmitter 100 of the effect its presence has on selected properties of the reference wireless power transmitter 100.
  • the wireless power transmitter 100 can configure the FOD function using this information.
  • the wireless power transmitter 100 may transmit an ACK/NAK for the FOD status data packet to the wireless power receiver 200 (S1215).
  • the wireless power receiver 200 may receive an identification data packet (ID), a capabilities data packet (CAP), and an extended CAP (XCAP) of the wireless power transmitter 100 using a general request data packet (GRQ).
  • ID identification data packet
  • CAP capabilities data packet
  • XCAP extended CAP
  • the general request packet may have a header value of 0x07 and may include a 1-byte message field.
  • the message field of the general request packet (GRQ) may include a header value of a data packet that the wireless power receiver 200 requests from the wireless power transmitter 100 using the GRQ packet.
  • the wireless power receiver 200 may transmit a GRQ packet (GRQ/id) requesting an ID packet of the wireless power transmitter 100 to the wireless power transmitter 100 (S1220).
  • GRQ/id GRQ/id
  • the wireless power transmitter 100 that has received the GRQ/id may transmit an ID packet to the wireless power receiver 200 (S1225).
  • the ID packet of the wireless power transmitter 100 includes information about the 'Manufacturer Code'.
  • the ID packet containing information about the 'Manufacturer Code' allows the manufacturer of the wireless power transmitter 100 to be identified.
  • the wireless power receiver 200 may transmit a GRQ packet (GRQ/cap) requesting a capability packet (CAP) of the wireless power transmitter 100 to the wireless power transmitter 100 ( S1230).
  • GRQ/cap GRQ packet
  • the message field of GRQ/cap may include the header value (0x31) of the capability packet (CAP).
  • the wireless power transmitter 100 that has received the GRQ/cap may transmit a capability packet (CAP) to the wireless power receiver 200 (S1235).
  • CAP capability packet
  • the wireless power receiver 200 may transmit a GRQ packet (GRQ/xcap) requesting a capability packet (CAP) of the wireless power transmitter 100 to the wireless power transmitter 100 ( S1240).
  • GRQ/xcap may include the header value (0x32) of the performance packet (XCAP).
  • the wireless power transmitter 100 that has received GRQ/xcap may transmit a capability packet (XCAP) to the wireless power receiver 200 (S1245).
  • XCAP capability packet
  • FIG. 13 is a diagram illustrating a message field of a capability packet (CAP) of a wireless power transmission device according to an embodiment.
  • CAP capability packet
  • a capability packet may have a header value of 0x31 and, referring to FIG. 19, may include a 3-byte message field.
  • the message field of the capability packet may include a 1-bit authentication (AR) flag and a 1-bit outband (OB) flag.
  • the authentication flag (AR) indicates whether the wireless power transmitter 100 supports the authentication function. For example, if the value of the authentication flag (AR) is '1', it indicates that the wireless power transmitter 100 supports the authentication function or can operate as an authentication responder, and the value of the authentication flag (AR) is If this is '0', it may indicate that the wireless power transmitter 100 does not support the authentication function or cannot operate as an authentication responder.
  • the outband (OB) flag indicates whether the wireless power transmitter 100 supports outband communication. For example, if the value of the outband (OB) flag is '1', the wireless power transmitter 100 indicates outband communication, and if the value of the outband (OB) flag is '0', the wireless power transmitter 100 may indicate that out-of-band communication is not supported.
  • the wireless power receiver 200 can receive the capability packet (CAP) of the wireless power transmitter 100 and check whether the wireless power transmitter 100 supports the authentication function and whether it supports out-of-band communication.
  • CAP capability packet
  • the wireless power receiver 200 uses at least one specific request packet (SRQ, Specific Request data packet) in the negotiation or renegotiation phase to enter into a power transfer agreement (Power Transfer) related to the power to be provided in the power transfer phase.
  • Contract) elements can be updated (S1250), and ACK/NAK for this can be received (S1255).
  • the wireless power receiver 200 transmits SRQ/en to the wireless power transmitter 100 (S1260) and receives ACK from the wireless power transmitter 100. You can (S1265).
  • the power transfer phase 840 is a part of the protocol in which actual power is transmitted to the load of the wireless power receiver 200.
  • power transfer may proceed according to the conditions of the power transfer contract created in the negotiation phase 830.
  • the wireless power receiver 200 can control the power level by transmitting control error (CE) data measuring the deviation between the target and the actual operating point of the wireless power receiver 200 to the wireless power transmitter 100. there is.
  • CE control error
  • the wireless power transmitter 100 and wireless power receiver 200 aim to make the control error data zero, at which point the system will operate at the target power level.
  • the wireless power transmitter 100 and the wireless power receiver 200 may exchange information to facilitate FOD.
  • the wireless power receiver 200 regularly reports the amount of power it receives (received power level) to the wireless power transmitter 100, and the wireless power transmitter 100 determines whether a foreign substance has been detected. This can be notified to the receiver 200.
  • Methods that can be used for FOD in the power transfer phase may correspond, for example, to power loss calculations.
  • the wireless power transmitter 100 compares the received power level reported by the wireless power receiver 200 with the amount of transmitted power (transmit power level) and when the difference exceeds a threshold, the wireless power receiver 200 ) can send a signal (about whether foreign substances have been monitored).
  • the wireless power transmitter 100 or the wireless power receiver 200 may request renegotiation of the power transfer contract during the power transfer phase.
  • Examples of changed circumstances in which renegotiation of a power transmission contract may occur include:
  • the wireless power transmitter 100 can no longer maintain the current power level due to the increased operating temperature (or vice versa, i.e., operates at a higher power level after the wireless power receiver 200 has sufficiently cooled down) when you can).
  • the wireless power transmitter 100 and the wireless power receiver 200 may initiate a data transmission stream to exchange application level data throughout the power transfer phase 840.
  • each side can verify the other's credentials in a tamper-proof manner.
  • the wireless power receiver 200 may want to check the credentials of the wireless power transmitter 100 to ensure that the wireless power transmitter 100 can be trusted to operate safely at high power levels. Having the appropriate credentials can mean you have passed compliance testing.
  • the present specification may provide a method of starting power transfer at a low power level and controlling the power to a higher level only after successfully completing the authentication protocol.
  • the operation between the wireless power transmitter 100 and the wireless power receiver 200 in the power transfer phase 840 has been schematically described.
  • the protocol in the power transfer phase 840 will be described separately as a baseline protocol and an extended protocol.
  • Figure 14 schematically shows a flowchart of the data flow for the power transfer phase 840 in the baseline protocol.
  • the wireless power receiver 200 may transmit CE to the wireless power transmitter 100 (S1410).
  • the wireless power receiver 200 can generally transmit CE data packets several times per second.
  • the wireless power receiver 200 may generally transmit a received power (RP) data packet (RP8 in the baseline protocol) to the wireless power transmitter 100 once every 1.5 seconds (S1420).
  • RP received power
  • the wireless power receiver 200 may transmit a charge status (CHS) data packet to the wireless power transmitter 100 (S1430).
  • CHS charge status
  • CE data packets can provide feedback on the desired power level.
  • the CE data packet may include a control error value, where the control error value may be a signed integer value that is a relative measure of the deviation between the actual operating point and the target operating point of the wireless power receiver 200. . If the control error value at this time is a positive value, it indicates that the actual operating point is below the target operating point, and the wireless power transmitter 100 may be requested to increase the power signal. If the control error value is a negative value, it indicates that the actual operating point is above the target operating point, and the wireless power transmitter 100 may be requested to reduce the power signal.
  • RP8 data packets can report the received power level.
  • RP8 data packets can only be included in the baseline protocol.
  • CHS data packets can provide the charge level of the battery at the load.
  • Figure 15 schematically shows a flowchart of the data flow for the power transfer phase 840 in the extended protocol.
  • the wireless power receiver 200 may transmit CE to the wireless power transmitter 100 (S1510).
  • the wireless power receiver 200 can generally transmit CE data packets several times per second.
  • the wireless power receiver 200 may generally transmit a received power (RP) data packet (RP in the extended protocol) to the wireless power transmitter 100 once every 1.5 seconds (S1515).
  • RP received power
  • control error packet (CE) and the received power packet (RP) are data packets that must be repeatedly transmitted / received according to the required timing constraints for control of wireless power.
  • the wireless power transmitter 100 can control the level of wireless power transmitted based on the control error packet (CE) and received power packet (RP) received from the wireless power receiver 200.
  • CE control error packet
  • RP received power packet
  • the wireless power transmitter 100 may respond to the received power packet (RP) with a bit pattern such as ACK, NAK, or ATN (S1520).
  • the fact that the wireless power transmitter 100 responds with ACK to a received power packet (RP/0) with a mode value of 0 means that power transmission can continue at the current level.
  • the wireless power transmitter 100 responds with NAK to a received power packet (RP/0) with a mode value of 0, this means that the wireless power receiver 200 must reduce power consumption.
  • the wireless power transmitter 100 For a received power packet (RP/1 or RP/2) with a mode value of 1 or 2, the wireless power transmitter 100 responds with ACK when the wireless power receiver 200 receives a received power packet (RP/1 or RP/2). This means that the power correction value included in RP/2) has been accepted.
  • the wireless power transmitter 100 For a received power packet (RP/1 or RP/2) with a mode value of 1 or 2, the wireless power transmitter 100 responds with NAK when the wireless power receiver 200 receives a received power packet (RP/1 or RP/2). This means that the power correction value included in RP/2) has not been accepted.
  • the previously described received power packet (RP/1) with a mode value of 1 may mean the first calibration data point, and the received power packet (RP/2) with a mode value of 2 may mean additional correction data. It may mean a point (additional calibration data point).
  • the wireless power receiver may transmit a plurality of additional power correction values by transmitting a received power packet (RP/2) with a mode value of 2 to the wireless power transmitter multiple times, and the wireless power transmitter may transmit the received RP/1 and several additional power correction values.
  • the calibration procedure can be performed based on the RP/2 of the dog.
  • the wireless power transmitter 100 When the wireless power transmitter 100 responds with ATN to the received power packet (RP), it means that the wireless power transmitter 100 requests permission for communication. That is, the wireless power transmitter 100 may transmit an attention (ATN) response pattern to request permission to transmit a data packet in response to an RP data packet. In other words, the wireless power transmitter 100 may transmit an ATN to the wireless power receiver 200 in response to the RP data packet and request the wireless power receiver 200 for permission to transmit the data packet.
  • ATN attention
  • the wireless power receiver 200 may transmit a charge status (CHS) data packet to the wireless power transmitter 100 (S1525).
  • CHS charge status
  • the wireless power transmitter 100 and the wireless power receiver 200 use DSR (data stream response) data packets and CAP data to initiate renegotiation of elements in the power transmission contract (generally guaranteed load power). Packets and NEGO data packets can be exchanged.
  • DSR data stream response
  • the wireless power receiver 200 may transmit a DSR data packet to the wireless power transmitter 100 (S1530), and the wireless power transmitter 100 may transmit a CAP to the wireless power receiver 200 (S1535).
  • the wireless power receiver 200 transmits a NEGO data packet to the wireless power transmitter 100 (S1540), and the wireless power transmitter 100 can transmit an ACK to the wireless power receiver 200 in response to the NEGO data packet. There is (S1545).
  • i) 0x00-DSR/nak Indicates that the last received data packet of the wireless power transmitter 100 was rejected.
  • the CAP data packet provides information about the function of the wireless power transmitter 100. The specific details are the same as described previously.
  • NEGO data packets may request the wireless power transmitter 100 to proceed to the renegotiation step.
  • the wireless power transmitter 100 and the wireless power receiver 200 may use auxiliary data control (ADC), auxiliary data transport (ADT), and DSR data packets to exchange application level data.
  • ADC auxiliary data control
  • ADT auxiliary data transport
  • DSR DSR data packets
  • the wireless power receiver 200 may transmit ADC/ADT to the wireless power transmitter 100 (S1550), and the wireless power transmitter 100 responds thereto.
  • ACK/NAK may be transmitted to the wireless power receiver 200 (S1555).
  • the wireless power receiver 200 may transmit a DSR to the wireless power transmitter 100 (S1560), and the wireless power transmitter may transmit ADC/ADT to the wireless power receiver (S1565).
  • the data transport stream serves to transfer application-level data from the data stream initiator to the data stream responder.
  • application level data can be broadly divided into i) authentication applications, and ii) proprietary (general purpose) applications.
  • messages/information related to the authentication application can be organized as follows.
  • the message used in the authentication procedure is called an authentication message.
  • Authentication messages are used to convey information related to authentication. There are two types of authentication messages. One is an authentication request, and the other is an authentication response. An authentication request is sent by an authentication initiator, and an authentication response is sent by an authentication responder.
  • the wireless power transmitting device and receiving device can be an authentication initiator or an authentication responder. For example, if the wireless power transmitting device is the authentication initiator, the wireless power receiving device becomes the authentication responder, and if the wireless power receiving device is the authentication initiator, the wireless power transmitting device becomes the authentication responder.
  • Authentication request messages include GET_DIGESTS, GET_CERTIFICATE, and CHALLENGE.
  • This request can be used to retrieve certificate chain digests.
  • the wireless power receiver 200 can request a desired number of digests at a time.
  • This request can be used to read segments of the target certificate chain.
  • This request can be used to initiate authentication of a power transmitter product device.
  • the authentication response message includes DIGESTS, CERTIFICATE, CHALLENGE_AUTH, and ERROR.
  • the wireless power transmitter 100 can send a certificate chain summary using the DIGESTS response and report slots containing a valid certificate chain summary.
  • This response can be used by the wireless power transmitter 100 to send the requested segment of the certificate chain.
  • the wireless power transmitter 100 can respond to the CHALLENGE request using CHALLENGE_AUTH.
  • This response can be used to transmit error information from the power transmitter.
  • the authentication message may be called an authentication packet, authentication data, or authentication control information. Additionally, messages such as GET_DIGEST and DIGESTS may also be called GET_DIGEST packets, DIGEST packets, etc.
  • Application-level data transmitted through a data transport stream may consist of a data packet sequence with the following structure.
  • FIG. 16 illustrates an application-level data stream between the wireless power transmitter 100 and the wireless power receiver 200 according to an example.
  • the data stream may include auxiliary data control (ADC) data packets and/or auxiliary data transport (ADT) data packets.
  • ADC auxiliary data control
  • ADT auxiliary data transport
  • ADC data packets are used to open a data stream.
  • ADC data packets can indicate the type of message included in the stream and the number of data bytes.
  • ADT data packets are sequences of data containing the actual message.
  • ADC/end data packets are used to signal the end of a stream. For example, the maximum number of data bytes in a data transport stream may be limited to 2047.
  • ACK or NAC is used to notify whether ADC data packets and ADT data packets are normally received.
  • control information necessary for wireless charging such as a control error packet (CE) or DSR, may be transmitted.
  • authentication-related information or other application-level information can be transmitted and received between a wireless power transmitter and a receiver.
  • Figure 17 shows a power control control method according to one embodiment.
  • the wireless power transmitter 100 and the wireless power receiver 200 can control the amount of power transmitted by performing communication along with power transmission and reception.
  • the wireless power transmitter and wireless power receiver operate at a specific control point.
  • the control point represents the combination of voltage and current provided from the output of the wireless power receiver when power transfer is performed.
  • the wireless power receiving device selects a desired control point - the desired output current/voltage, temperature of a specific location of the mobile device, etc., and additionally selects the actual control point currently operating. ) is determined.
  • the wireless power receiving device can use the desired control point and the actual control point to calculate a control error value and transmit it as a control error packet to the wireless power transmitting device.
  • the wireless power transmitter can control power transfer by setting/controlling new operating points - amplitude, frequency, and duty cycle - using the received control error packet. Therefore, control error packets are transmitted/received at regular time intervals in the strategy delivery stage.
  • the wireless power receiving device sets the control error value to a negative number when trying to reduce the current of the wireless power transmitting device, and sets the control error value to a negative number when trying to increase the current. You can transmit by setting the value to a positive number. In this way, in the inductive mode, the wireless power receiver can control power transmission by transmitting a control error packet to the wireless power transmitter.
  • the wireless power transmission device transmits basic power in common, and the wireless power reception device intends to use a method of controlling the amount of power received by controlling its own resonance frequency.
  • the method described in FIG. 17 is not completely excluded, and additional transmission power control may be performed using the method in FIG. 17.
  • Wireless charging methods include a magnetic induction method that uses the magnetic induction phenomenon between the primary and secondary coils, and a magnetic resonance method that transmits power by creating magnetic resonance using frequencies ranging from tens of kHz to several MHz.
  • the wireless charging standard for the magnetic resonance method is led by a council called A4WP
  • the standard for the magnetic induction method is led by the Wireless Power Consortium (WPC).
  • WPC is designed to exchange various status information and commands related to the wireless charging system in-band.
  • the Qi standard in WPC defines a baseline power profile (BPP), an extended power profile (EPP), and a magnetic power profile.
  • BPP baseline power profile
  • EPP extended power profile
  • MPP magnetic power profile
  • BPP Baseline power profile
  • BPP relates to a power transfer profile between a wireless power transmitter and receiver that supports power transfer of up to 5W. And, in BPP, unidirectional communication from a wireless power receiver to a wireless power transmitter is supported. The communication method at this time may correspond to ASK (amplitude shift keying). In BPP, there may be protocol phases of ping, configuration, and power transfer.
  • ASK amplitude shift keying
  • EPP relates to a power transfer profile between a wireless power transmitter and receiver that supports power transfer of up to 15W. And, in EPP, bidirectional communication between a wireless power receiver and a wireless power transmitter is supported.
  • the communication method from the wireless power receiver to the wireless power transmitter may correspond to amplitude shift keying (ASK), and the communication method from the wireless power transmitter to the wireless power receiver may correspond to frequency shift keying (FSK).
  • ASK amplitude shift keying
  • FSK frequency shift keying
  • EPP may correspond to a higher profile of BPP.
  • the EPP wireless power transmitter can operate as a BPP wireless power transmitter.
  • the EPP wireless power receiver can operate as a BPP wireless power receiver.
  • EPP can maintain compatibility with BPP.
  • the EPP wireless power receiver can indicate that it is an EPP wireless power receiver by setting the 'neg' bit in the configuration packet (i.e. CFG) to 1.
  • configuration packets are as described above.
  • the EPP wireless power transmitter When the EPP wireless power transmitter receives a configuration packet with the 'neg' bit set to 1 from the wireless power receiver, the EPP wireless power transmitter may respond to the wireless power receiver with an ACK FSK bit pattern.
  • the BPP wireless power transmitter does not support the FSK communication method, so the BPP wireless power transmitter cannot transmit FSK bit patterns. Accordingly, the EPP wireless power receiver, which set the 'neg' bit to 1 and transmitted a configuration packet to the BPP wireless power transmitter, does not receive the above ACK response, thereby identifying the other wireless power transmitter as a BPP wireless power transmitter. .
  • MPP magnetic power profile
  • MPP relates to a power transfer profile between a wireless power transmitter and receiver that supports power transfer of up to 15W. And, in MPP, bidirectional communication between a wireless power receiver and a wireless power transmitter is supported.
  • the communication method from the wireless power receiver to the wireless power transmitter may correspond to amplitude shift keying (ASK), and the communication method from the wireless power transmitter to the wireless power receiver may correspond to frequency shift keying (FSK).
  • ASK amplitude shift keying
  • FSK frequency shift keying
  • MPP there may be protocol phases of ping, setup, MPP negotiation, and MPP power transfer.
  • MPP may correspond to a higher profile of BPP.
  • the MPP wireless power transmitter can operate as a BPP wireless power transmitter.
  • the MPP wireless power receiver can operate as a BPP wireless power receiver.
  • MPP can maintain compatibility with BPP.
  • the MPP wireless power receiver may use a specific MPP indicator within the extended ID packet.
  • the wireless power receiver In order for the MPP wireless power receiver to indicate whether MPP is supported through XID, the wireless power receiver must inform the wireless power transmitter that the XID is transmitted through an ID packet.
  • the ID packet transmitted by the MPP wireless power receiver may be as follows.
  • Figure 18 schematically shows the structure of an MPP ID packet.
  • the value of the major version field from b4 to b7 of B0 may be set to 1.
  • the value of the minor version field from b0 to b3 of B0 may be a value to be determined later.
  • the values of the manufacturer codes of B1 and B2 may be assigned as PRMC codes.
  • the value of the 'ext' field of b7 of B3 may be set to 1 to indicate that an XID packet is additionally transmitted.
  • the values of the random identifier fields of b0 to b6 of B3 and b3 to b7 of B4 and B5 may be set according to a random device identification policy.
  • Figure 19 schematically shows an example of an XID packet in MPP.
  • an XID packet in MPP may include an 'XID Selector' field, a 'Restricted' field, and a 'Freq Mask' field.
  • whether MPP is supported can be determined depending on whether the value of 'XID selector' is 0xFE. That is, if the value of B_0 of the XID is 0xFE, the XID at this time may correspond to information indicating that the wireless power receiver supports MPP.
  • the 'Restricted' field may correspond to information indicating whether the wireless power receiver operates in MPP restricted mode or MPP full mode. If the wireless power receiver selects to operate in MPP limited mode, the above field can be set to 1. Meanwhile, in other cases (eg, when the wireless power receiver selects not to operate in MPP limited mode), the above field may be set to 0.
  • the 'Preferred Frequency' field may mean the MPP preferred frequency.
  • this field can be set to 128 kHz. Otherwise, the wireless power receiver can set this field to 360 kHz.
  • the 'Freq Mask' field corresponds to a field for determining whether the operating frequency of 360 kHz is supported. That is, if the 'Freq Mask' field is set to 0, 360kHz is supported.
  • the wireless power transmitter determines whether the 'Ext' bit of the ID received from the wireless power receiver is set to 1 and whether B_0 of the You can decide whether to support it or not.
  • the MPP wireless power transmitter can use the information contained in the ID and XID packets to perform a digital ping and identify the receiver.
  • the wireless power transmitter may determine that the wireless power receiver supports MPP if all of the following conditions are met.
  • the subheader (byte 0) of the XID packet is set to the MPP selector.
  • the wireless power transmitter can proceed with subsequent procedures according to the Qi v1.3 specification.
  • the wireless power transmitter performs the following.
  • MPP restricted mode When the 'restricted' flag is set to 1.
  • MPP full mode When the 'restricted' flag is set to 0.
  • the MPP wireless power transmitter when the MPP wireless power transmitter receives a configuration packet with the 'neg' bit set to 1 from the wireless power receiver (in MPP full mode), the MPP wireless power transmitter (in MPP full mode) responds to this by using the MPP ACK FSK bit pattern. It can respond to the wireless power receiver.
  • the wireless power transmitter in MPP limited mode does not support the FSK communication method, so the wireless power transmitter in MPP limited mode cannot transmit FSK bit patterns.
  • the wireless power transmitter in MPP limited mode uses an operation signal of 360 kHz to transmit power, the 'neg' bit is set to 1 and a configuration packet is transmitted to the wireless power transmitter operating in MPP limited mode.
  • the MPP wireless power receiver can identify the other wireless power transmitter as an MPP limited mode wireless power transmitter through the operating frequency.
  • MPP Restricted mode also known as MPP Baseline Profile
  • MPP Full mode also known as MPP Full Profile
  • the 'restricted' field in the XID is set to 1, but in MPP full mode, the 'restricted' field in the XID is set to 0.
  • FSK communication is not supported in MPP limited mode, but FSK communication may be supported in MPP full mode.
  • MPP ACK for CFG cannot be transmitted, and therefore, MPP negotiation is not supported in MPP limited mode.
  • MPP full mode FSK communication is supported, so MPP ACK for CFG can be transmitted, and accordingly, MPP negotiation can be supported in MPP full mode.
  • MPP limited mode can be used interchangeably with the MPP baseline profile
  • MPP full mode can be interchanged with the MPP full profile
  • FSK communication is not supported in MPP restricted mode. That is, in the MPP limited mode, there may be no data packets transmitted from the wireless power transmitter to the wireless power receiver.
  • MPP restricted mode the protocol in MPP restricted mode will be explained through the drawings.
  • Figure 20 schematically shows the protocol in MPP restricted mode.
  • the wireless power receiver may transmit a SIG to the wireless power transmitter on a first operating frequency (eg, 128 kHz).
  • a first operating frequency eg, 128 kHz.
  • the first operating frequency may correspond to an operating frequency at which BPP and/or EPP can be performed.
  • the first operating frequency at this time corresponds to the frequency at which the wireless power transmitter operates.
  • the wireless power receiver may transmit an ID packet to the wireless power transmitter on a first operating frequency.
  • the 'ext' bit of the ID may be set to 1 to indicate that the XID is additionally transmitted.
  • the wireless power receiver may transmit an XID packet to the wireless power transmitter on a first operating frequency.
  • the value of B0 in the XID may be 0xFE, and if the value of B0 in the XID is set to 0xFE, this may correspond to information indicating that the wireless power receiver supports MPP.
  • the 'Restricted' field in the XID at this time may be set to 1 to indicate that the wireless power receiver operates in MPP restricted mode.
  • the wireless power transmitter may remove the power signal and restart the ping phase at a new operating frequency.
  • the wireless power receiver When the ping phase is restarted, the wireless power receiver begins transmitting the SIG again.
  • the operating frequency at this time may be a second operating frequency (eg, 360 kHz).
  • the wireless power receiver transmits ID, XID, and CFG packets to the wireless power transmitter at the second operating frequency, respectively.
  • the wireless power receiver can receive wireless power based on the MPP baseline from the wireless power transmitter by transmitting a CEP to the wireless power transmitter.
  • FSK communication can be supported in MPP full mode. That is, in MPP full mode, there may be data packets transmitted from the wireless power transmitter to the wireless power receiver. In other words, MPP negotiation, etc. may be conducted between a wireless power transmitter and a wireless power receiver. Against this background, the protocol in MPP full mode will be explained through the drawings.
  • FIGS 21 and 22 schematically show the protocol in MPP full mode.
  • the wireless power receiver may transmit a SIG to the wireless power transmitter on a first operating frequency (eg, 128 kHz).
  • a first operating frequency eg, 128 kHz.
  • the first operating frequency may correspond to an operating frequency at which BPP and/or EPP can be performed.
  • the first operating frequency at this time corresponds to the frequency at which the wireless power transmitter operates.
  • the wireless power receiver may transmit an ID packet to the wireless power transmitter on a first operating frequency.
  • the 'ext' bit of the ID may be set to 1 to indicate that the XID is additionally transmitted.
  • the wireless power receiver may transmit an XID packet to the wireless power transmitter on a first operating frequency.
  • the value of B0 in the XID may be 0xFE, and if the value of B0 in the XID is set to 0xFE, this may correspond to information indicating that the wireless power receiver supports MPP.
  • the 'Restricted' field in the XID at this time may be set to 0 to indicate that the wireless power receiver operates in MPP full mode.
  • the power signal is not removed even if the wireless power transmitter receives an XID packet from the wireless power receiver. At this time, since the power signal has not yet been removed, the wireless power receiver transmits a CFG packet to the wireless power transmitter after the XID packet.
  • the wireless power receiver can receive an MPP ACK from the wireless power transmitter as a response to the above CFG packet.
  • the wireless power receiver that receives the MPP ACK enters a negotiation phase with the wireless power transmitter, and both the wireless power receiver and the wireless power transmitter can proceed with negotiation.
  • the wireless power receiver may enter a power transfer phase with the wireless power transmitter.
  • the wireless power receiver transmits an EPT packet to the wireless power transmitter.
  • the wireless power transmitter that receives the EPT packet removes the power signal and can then restart the ping phase at a new operating frequency.
  • the wireless power receiver starts again from transmitting the SIG.
  • the operating frequency at this time may be a second operating frequency (eg, 360 kHz).
  • the wireless power receiver transmits ID, XID, and CFG packets to the wireless power transmitter at the second operating frequency, respectively. And, the wireless power receiver can receive the MPP ACK from the wireless power transmitter.
  • the wireless power receiver that receives the MPP ACK enters a negotiation phase with the wireless power transmitter at the second operating frequency, and both the wireless power receiver and the wireless power transmitter can proceed with negotiation.
  • the wireless power receiver After negotiation, the wireless power receiver enters a power transfer phase with the wireless power transmitter at the second operating frequency.
  • the wireless power receiver may receive wireless power based on the MPP full mode from the wireless power transmitter by transmitting an XCE to the wireless power transmitter and responding (eg, receiving an ACK).
  • authentication is provided in the current WPC Qi specification.
  • authentication may proceed as follows.
  • the wireless power receiver can become an initiator and send (request) an authentication request to the wireless power transmitter.
  • the wireless power transmitter becomes a responder, and the wireless power transmitter transmits an authentication response to the request from the wireless power receiver to the wireless power receiver.
  • the wireless power receiver can authenticate the wireless power transmitter.
  • Figure 23 shows an example of an authentication message header.
  • all messages related to authentication have a header, and the authentication message header may include an authentication protocol version field and a message type field.
  • Figure 24 shows an example of the authentication protocol version field.
  • the authentication protocol version field may have values from 0x0 to 0xF. At this time, if the value of the authentication protocol version field is 0x0, this may mean a reserved value. If the value of the authentication protocol version field is 0x1, this may mean authentication protocol version 1.0. If the value of the authentication protocol version field is 0x2 to 0xF, this may mean a reserved value.
  • Figure 25 shows an example of the message type field for an authentication request.
  • the value of the message type field is 0x0 to 0x7, this is the value used for the authentication response. If the value of the message type field is 0x8, this may mean a reserved value. If the value of the message type field is 0x9, this may mean GET_DIGESTS. If the value of the message type field is 0xA, this may mean GET_CERTIFICATE. If the value of the message type field is 0xB, this may mean CHALLENGE. If the value of the message type field is 0xC to 0xF, this may mean a reserved value.
  • Figure 26 shows an example of the message type field for an authentication response.
  • the value of the message type field is 0x0, this may mean a reserved value. If the value of the message type field is 0x1, this may mean DIGESTS. If the value of the message type field is 0x2, this may mean CERTIFICATE. If the value of the message type field is 0x3, this may mean CHALLENGE_AUTH. If the value of the message type field is 0x4 to 0x6, this may mean a reserved value. If the value of the message type field is 0x7, this may mean ERROR. If the value of the message type field is 0x8 to 0xF, this is the value used for the authentication request.
  • the authentication request message sent by the wireless power receiver consists of GET_DIGESTS/GET_CERTIFICATE/CHALLENGE.
  • Figure 27 shows an example of GET_DIGESTS.
  • Figure 28 shows an example of GET_CERTIFICATE.
  • Figure 29 shows an example of CHALLENGE.
  • authentication request messages include GET_DIGESTS, GET_CERTIFICATE, and CHALLENGE.
  • This request can be used to retrieve certificate chain digests.
  • the wireless power receiver 200 can request a desired number of digests at a time.
  • This request can be used to read segments of the target certificate chain.
  • This request can be used to initiate authentication of a power transmitter product device.
  • the authentication response message sent by the wireless power transmitter includes DIGESTS/CERTIFICATE/CHALLENGE_AUTH. Additionally, the authentication response message may include ERROR.
  • Figure 30 shows an example of DIGESTS.
  • Figure 31 shows an example of CERTIFICATE.
  • Figure 32 shows an example of CHALLENGE_AUTH.
  • Figure 33 shows an example of ERROR.
  • the authentication response message includes DIGESTS, CERTIFICATE, CHALLENGE_AUTH, and ERROR.
  • the wireless power transmitter 100 can send a certificate chain summary using the DIGESTS response and report slots containing a valid certificate chain summary.
  • This response can be used by the wireless power transmitter 100 to send the requested segment of the certificate chain.
  • the wireless power transmitter 100 can respond to the CHALLENGE request using CHALLENGE_AUTH.
  • This response can be used to transmit error information from the power transmitter.
  • the authentication function has been added as a new feature to WPC Qi, a wireless charging standard.
  • Authentication is a process to check whether the other device has actually been certified by Qi, and is a very important way to check whether a standard product exists.
  • Authentication in the current specification is carried out at the request of PRx, and this function is an optional configuration rather than a required function.
  • the PTx sends an authentication response to the authentication request sent by the PRx, so that the PRx checks whether the PTx has Qi authentication.
  • Figure 34 is a flowchart of a method for transmitting wireless power, according to an embodiment of the present specification.
  • the wireless power transmitter may enter a power transfer phase related to transmitting wireless power (S3410).
  • the power transfer phase 840 is a part of the protocol in which actual power is transmitted to the load of the wireless power receiver 200.
  • power transfer may proceed according to the conditions of the power transfer contract created in the negotiation phase 830.
  • the wireless power transmitter 100 and the wireless power receiver 200 may initiate a data transmission stream to exchange application level data throughout the power transfer phase 840.
  • each side can verify the other's credentials in a tamper-proof manner.
  • the wireless power receiver 200 may want to check the credentials of the wireless power transmitter 100 to ensure that the wireless power transmitter 100 can be trusted to operate safely at high power levels. Having the appropriate credentials can mean you have passed compliance testing.
  • the present specification may provide a method of starting power transfer at a low power level and controlling the power to a higher level only after successfully completing the authentication protocol.
  • the wireless power transmitter may receive the first application message from the wireless power receiver in the power transfer phase (S3420).
  • the first application message may be transmitted through a data transport stream (data stream).
  • the data stream may include auxiliary data control (ADC) data packets and/or auxiliary data transport (ADT) data packets.
  • ADC auxiliary data control
  • ADT auxiliary data transport
  • ADC data packets are used to open a data stream.
  • ADC data packets can indicate the type of message included in the stream and the number of data bytes.
  • ADT data packets are sequences of data containing the actual message.
  • ADC/end data packets are used to signal the end of a stream.
  • a second application message that is a response to the first application message may be transmitted to the wireless power receiver.
  • the second application message may also be transmitted through a data transport stream (data stream).
  • data transport stream A detailed description of the data transport stream is the same as described above.
  • the application message exchanged between the wireless power transmitter and the wireless power receiver may be an authentication request message or an authentication response message.
  • the first application message is an authentication request message
  • the first application message may correspond to, for example, GET_DIGESTS/GET_CERTIFICATE/CHALLENGE.
  • the second application message is an authentication response message
  • the second application message may correspond to DIGESTS/CERTIFICATE/CHALLENGE_AUTH.
  • the wireless power transmitter may start transmitting the second application message within a specific time period.
  • the starting point of a specific time interval may be the ending point of the first application message.
  • the specific time interval at this time may be t_DigestReady.
  • the value of t_DigestReady may correspond to, for example, 3 seconds.
  • t_DigestTimeout may equal 43 seconds.
  • the TPR can be configured to send multiple RP/0 packets (e.g., 3-4 times per second). This allows the wireless power transmitter multiple opportunities to respond within 3 seconds after receiving GET_DIGESTS.
  • t_DigestReady may be, for example, as follows. Examples of the time regulations below are explained in more detail, for example, in the examples described later.
  • Figure 35 shows problems that may occur in existing technology when charging is stopped due to detection of foreign substances, etc.
  • the wireless device enters the PT phase through DP, SS/ID/CFG, Negotiation, and Calibration for charging.
  • High power mode When entering high-power mode and recharging due to foreign matter detection or an error, authentication is initialized and the wireless device performs authentication again.
  • Certificate Chain Segment in the Certificate response message in Figure 31 is a very large byte, so it takes a long time to perform authentication.
  • Certificate Chain Hash LSB, Signature r value, Signature s value, etc. have a small number of bits. Accordingly, the corresponding information can be used in the later-described embodiment proposed for fast authentication.
  • Authentication refers to the process of confirming whether the product is genuine and has received WPC certification. Regardless of Ptx and Prx, the entity performing authentication can be set as authentication initiator and responder.
  • Example #1 High power mode re-entry through Fast Authentication in negotiation (Fast Authentication through PRx’s SRQ/auth)
  • Figure 36 shows an example of performing Fast Authentication through SRQ/auth of PRx.
  • Figure 36 shows an embodiment of performing Fast Authentication by adding a new SRQ packet of SRQ/auth.
  • ACK means approval for SRQ/Auth
  • NAK means rejection for SRQ/Auth
  • ND means non-support for SRQ/Auth.
  • the bottom of Figure 36 shows the bit configuration of SRQ/auth.
  • Value included in B1 of SRQ/auth includes at least one of Certificate chain hash, Signature r value, Signature s value, LSB (Least Significant Bit), and MSB (Most Significant Bit) information of the certificate chain.
  • PRx transmits the Certificate chain hash LSB as the Value value to SRQ/Auth.
  • the value transmits the Certificate chain hash LSB of the recently authenticated PTx.
  • PRx does not have a certificate chain, so it transmits the value of the recently authenticated PTx.
  • PTx compares the Certificate chain hash LSB it holds, and if it is the same as the value sent by PRx, it transmits ACK. If it is different, it transmits NAK. If it does not support SRQ/auth, it transmits ND.
  • Figure 37 shows an example of re-entry into High power mode through Fast Authentication in Negotiation.
  • the wireless device after entering the first charge, the wireless device stops charging in High power mode, and after re-entering the charge, performs the Fast Authentication of Example #1 in Negotiation (SRQ/Auth - ACK), then skips the Authentication and immediately charges to High Power Mode. Enter power mode and perform high-speed charging.
  • SRQ/Auth - ACK Fast Authentication of Example #1 in Negotiation
  • the wireless device compares the value of SRQ/auth with the recently authenticated authentication data before recharging.
  • PRx receives ACK for SRQ/Auth, it can skip Authentication and immediately enter High power mode. If PRx receives NACK for SRQ/Auth, it can proceed with Authentication and Re-calibration again and enter High power mode.
  • Example #2 High power mode re-entry through Fast Authentication in Negotiation (Fast Authentication through GRQ/Auth packet)
  • Figure 38 shows an example of performing Fast Authentication through GRQ/Auth packet.
  • Figure 38 shows an embodiment of performing Fast Authentication by adding a new Auth packet for GRQ.
  • PRx requests GRQ
  • PTx requests Auth. Send packet.
  • the bottom of Figure 38 shows the bit configuration of the Auth packet.
  • Value included in B0 to Bn of the Auth packet includes a combination of various information including Certificate chain hash LSB, Signature r value LSB, Signature s value LSB, Certificate chain hash, and certificate chain LSB.
  • PTx is a data value included in the Auth packet information and transmits the information described above.
  • PRx compares the information received from PTx with the most recently authenticated information. In other words, PRx compares the information authenticated in the most recent authentication with the information in the Auth packet received from PTx through a GRQ request.
  • PRx and PTx enter High power mode immediately after entering the PT phase and perform high-speed charging. If the information is different, PRx and PTx perform authentication again through the Authentication function and enter High power mode.
  • Figure 39 shows another example of re-entry into high power mode through fast authentication in negotiation.
  • the wireless device after entering the first charge, the wireless device stops charging in High power mode, and after re-entering the charge, performs the Fast Authentication of Example #2 in the Negotiation phase (GRQ - Auth), then skips Authentication and immediately turns on High power. Enter mode and perform high-speed charging.
  • GRQ - Auth the Fast Authentication of Example #2 in the Negotiation phase
  • the wireless device compares the value of the GRQ/Auth packet with the recently authenticated authentication data before recharging.
  • PRx and PTx can skip authentication and immediately enter High power mode. If the value of the Auth packet is different from the most recently authenticated information before charging, PRx and PTx can perform authentication and re-calibration again and enter high power mode.
  • Example #3 High power mode re-entry through Fast Authentication in the power transfer phase (Fast Authentication through GRQ/Auth packet)
  • Figure 40 shows an example of performing Fast Authentication through GRQ/Auth packet.
  • Figure 40 shows an embodiment of performing Fast Authentication by adding a new Auth packet through GRQ in the power transfer phase.
  • PRx requests GRQ
  • PTx requests Auth. Send packet.
  • the bottom of Figure 40 shows the bit configuration of the Auth packet.
  • Value included in B0 to Bn of the Auth packet includes a combination of various information including Certificate chain hash LSB, Signature r value LSB, Signature s value LSB, Certificate chain hash, and certificate chain LSB.
  • PTx transmits the data value included in the Auth packet information, that is, the information described above.
  • PRx compares the information received from PTx with the most recently authenticated information. In other words, PRx compares the information authenticated in the most recent authentication with the information in the Auth packet received from PTx through a GRQ request.
  • PRx and PTx immediately enter high power mode and perform high-speed charging. If the information is different, PRx and PTx perform authentication again through the Authentication function and enter High power mode.
  • Figure 41 shows an example of re-entering high power mode through Fast Authentication in the power transfer phase.
  • the wireless device after entering the first charge, the wireless device stops charging in High power mode, and after re-entering the charge, performs Fast Authentication of Example #3 in the power transfer phase (GRQ - Auth), then skips Authentication and immediately starts High Power Mode. Enter power mode and perform high-speed charging.
  • GRQ - Auth Fast Authentication of Example #3 in the power transfer phase
  • the wireless device compares the value of the GRQ/Auth packet with the recently authenticated authentication data before recharging.
  • PRx and PTx can skip authentication and immediately enter High power mode. If the value of the Auth packet is different from the most recently authenticated information before charging, PRx and PTx can perform authentication and re-calibration again and enter high power mode.
  • All of the above-described embodiments propose a method of recharging through Fast Authentication when charging is interrupted in high power mode (i.e., in the Power Transfer phase). Additionally, the above-described embodiment may include not only high power mode, but also cases where charging is stopped during re-calibration. That is, the above-described embodiment (although not shown) may also include a method of recharging through Fast Authentication when charging is interrupted during re-calibration.
  • Figure 42 is a flowchart of a method of re-entering the fast power mode through fast authentication from the perspective of a wireless power transmitter, according to an embodiment of the present specification.
  • the wireless power transmitter receives a CFG (Configuration) packet from the wireless power receiver in the configuration phase (S4210).
  • the wireless power transmitter enters a negotiation phase with the wireless power receiver based on the CFG packet (S4220).
  • the wireless power transmitter performs authentication in the power transfer phase after the negotiation phase and enters the high power mode (S4230).
  • the wireless power transmitter may re-enter the configuration phase, the negotiation phase, and the power transfer phase.
  • the wireless power transmitter may receive a General Request (GRQ) packet from the wireless power receiver.
  • the wireless power transmitter may transmit an Auth packet to the wireless power receiver in response to the GRQ packet.
  • GRQ General Request
  • the wireless power transmitter may re-enter the high power mode without performing the authentication in the re-entry power transfer phase.
  • the wireless power transmitter may re-perform the authentication in the re-entry power transfer phase and enter the high-power mode again.
  • the high-speed power mode can be re-entered through quick authentication.
  • the wireless power transmitter may perform re-calibration after performing the authentication in the power transfer phase.
  • the recalibration can be performed in the baseline power profile (BPP) and extended power profile (EPP). However, there is no calibration process in magnetic power profile (MPP).
  • the wireless power transmitter may re-perform the re-calibration after re-performing the authentication in the re-entry power transfer phase.
  • the wireless power transmitter may re-enter the configuration phase, the negotiation phase, and the power transfer phase.
  • the wireless power transmitter may receive the GRQ packet from the wireless power receiver.
  • the wireless power transmitter may transmit the Auth packet to the wireless power receiver in response to the GRQ packet.
  • the wireless power transmitter may re-enter the high power mode without performing the authentication in the re-entry power transfer phase.
  • the wireless power transmitter may re-perform the authentication in the re-entry power transfer phase and enter the high-power mode again.
  • the Auth packet may include at least one information among Certificate chain hash LSB, Signature r value LSB, Signature s value LSB, Certificate chain hash, and certificate chain LSB. Since the above information all has a small number of bits, it may be suitable information for performing fast authentication in this embodiment.
  • the most recently authenticated information may be information stored in the wireless power receiver through the authentication immediately before the wireless charging is stopped.
  • the wireless power transmitter may re-enter the configuration phase, the negotiation phase, and the power transfer phase.
  • the wireless power transmitter may receive the GRQ packet from the wireless power receiver.
  • the wireless power transmitter may transmit the Auth packet to the wireless power receiver in response to the GRQ packet.
  • the wireless power transmitter may re-enter the high power mode without performing the authentication in the re-entry power transfer phase.
  • the wireless power transmitter may re-perform the authentication in the re-entry power transfer phase and enter the high-power mode again.
  • this embodiment provides a method of performing quick authentication through confirmation of previously authenticated information by exchanging simple information in the negotiation phase (or power transfer phase) when the authenticated wireless device enters recharging. suggest.
  • it is possible to quickly authenticate the product and enter high-speed charging, and it is possible to authenticate the wireless device before entering the power transfer phase of wireless charging, which has the effect of enabling rapid entry into high-speed charging.
  • Figure 43 is a flowchart of a method of re-entering the fast power mode through fast authentication from the perspective of a wireless power receiver, according to an embodiment of the present specification.
  • the wireless power receiver transmits a CFG (Configuration) packet to the wireless power transmitter in the configuration phase (S4310).
  • the wireless power receiver enters a negotiation phase with the wireless power transmitter based on the CFG packet (S4320).
  • the wireless power receiver performs authentication in the power transfer phase after the negotiation phase and enters the high power mode (S4330).
  • the wireless power receiver may re-enter the configuration phase, the negotiation phase, and the power transfer phase.
  • the wireless power receiver may transmit a General Request (GRQ) packet to the wireless power transmitter.
  • the wireless power receiver may receive an Auth packet in response to the GRQ packet from the wireless power transmitter.
  • GRQ General Request
  • the wireless power receiver may re-enter the high power mode without performing the authentication in the re-entry power transfer phase.
  • the wireless power receiver may re-perform the authentication in the re-entry power transfer phase and enter the high-power mode again.
  • the high-speed power mode can be re-entered through quick authentication.
  • the wireless power receiver may perform re-calibration after performing the authentication in the power transfer phase.
  • the recalibration can be performed in the baseline power profile (BPP) and extended power profile (EPP). However, there is no calibration process in magnetic power profile (MPP).
  • the wireless power receiver may re-perform the re-calibration after re-performing the authentication in the re-entry power transfer phase.
  • the wireless power receiver may re-enter the configuration phase, the negotiation phase, and the power transfer phase.
  • the wireless power receiver may transmit the GRQ packet to the wireless power transmitter in the re-entry negotiation phase.
  • the wireless power receiver may receive the Auth packet in response to the GRQ packet from the wireless power transmitter.
  • the wireless power receiver may re-enter the high power mode without performing the authentication in the re-entry power transfer phase.
  • the wireless power receiver may re-perform the authentication in the re-entry power transfer phase and enter the high-power mode again.
  • the Auth packet may include at least one information among Certificate chain hash LSB, Signature r value LSB, Signature s value LSB, Certificate chain hash, and certificate chain LSB. Since the above information all has a small number of bits, it may be suitable information for performing fast authentication in this embodiment.
  • the most recently authenticated information may be information stored in the wireless power receiver through the authentication immediately before the wireless charging is stopped.
  • the wireless power receiver may re-enter the configuration phase, the negotiation phase, and the power transfer phase.
  • the wireless power receiver may transmit the GRQ packet to the wireless power transmitter.
  • the wireless power receiver may receive the Auth packet in response to the GRQ packet from the wireless power transmitter.
  • the wireless power receiver may re-enter the high power mode without performing the authentication in the re-entry power transfer phase.
  • the wireless power receiver may re-perform the authentication in the re-entry power transfer phase and enter the high-power mode again.
  • this embodiment provides a method of performing quick authentication through confirmation of previously authenticated information by exchanging simple information in the negotiation phase (or power transfer phase) when the authenticated wireless device enters recharging. suggest.
  • it is possible to quickly authenticate the product and enter high-speed charging, and it is possible to authenticate the wireless device before entering the power transfer phase of wireless charging, which has the effect of enabling rapid entry into high-speed charging.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Charge And Discharge Circuits For Batteries Or The Like (AREA)

Abstract

La présente invention concerne un procédé de réalisation d'une recharge sans fil en mode haute puissance avec une authentification rapide dans un système de transmission d'énergie sans fil, dans lequel, lorsque la charge sans fil est interrompue en mode haute puissance, un émetteur d'énergie sans fil entre dans une phase de configuration, une phase de négociation et une phase de transfert d'énergie. Dans la phase de négociation réintroduite, l'émetteur d'énergie sans fil reçoit un paquet de requête générale (GRQ) en provenance d'un récepteur d'énergie sans fil. Dans la phase de négociation réintroduite, l'émetteur d'énergie sans fil transmet un paquet Auth au récepteur d'énergie sans fil en réponse au paquet GRQ.
PCT/KR2023/011730 2022-10-06 2023-08-09 Procédé et dispositif de réalisation d'une recharge sans fil en mode haute puissance avec une authentification rapide dans un système de transmission d'énergie sans fil WO2024075967A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2022-0128075 2022-10-06
KR20220128075 2022-10-06

Publications (1)

Publication Number Publication Date
WO2024075967A1 true WO2024075967A1 (fr) 2024-04-11

Family

ID=90608620

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2023/011730 WO2024075967A1 (fr) 2022-10-06 2023-08-09 Procédé et dispositif de réalisation d'une recharge sans fil en mode haute puissance avec une authentification rapide dans un système de transmission d'énergie sans fil

Country Status (1)

Country Link
WO (1) WO2024075967A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140337643A1 (en) * 2013-05-09 2014-11-13 Canon Kabushiki Kaisha Power supply apparatus, electronic apparatus, and method
US20170047782A1 (en) * 2015-08-10 2017-02-16 Qualcomm Incorporated Method and apparatus for varying a wireless charging category of a wireless power receiver in wireless charging applications
KR20190138631A (ko) * 2017-05-01 2019-12-13 엘지전자 주식회사 무선전력 전송시스템에서 인증을 수행하는 장치 및 방법
KR20210028534A (ko) * 2019-09-04 2021-03-12 삼성전자주식회사 전자 장치 및 전자 장치의 인증 방법
WO2021235864A1 (fr) * 2020-05-20 2021-11-25 엘지전자 주식회사 Procédé de transmission d'énergie sans fil et procédé de réception d'énergie sans fil

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140337643A1 (en) * 2013-05-09 2014-11-13 Canon Kabushiki Kaisha Power supply apparatus, electronic apparatus, and method
US20170047782A1 (en) * 2015-08-10 2017-02-16 Qualcomm Incorporated Method and apparatus for varying a wireless charging category of a wireless power receiver in wireless charging applications
KR20190138631A (ko) * 2017-05-01 2019-12-13 엘지전자 주식회사 무선전력 전송시스템에서 인증을 수행하는 장치 및 방법
KR20210028534A (ko) * 2019-09-04 2021-03-12 삼성전자주식회사 전자 장치 및 전자 장치의 인증 방법
WO2021235864A1 (fr) * 2020-05-20 2021-11-25 엘지전자 주식회사 Procédé de transmission d'énergie sans fil et procédé de réception d'énergie sans fil

Similar Documents

Publication Publication Date Title
WO2020197267A1 (fr) Dispositif et procédé permettant d'exécuter une correction de puissance dans un système de transmission de puissance sans fil
WO2020190109A1 (fr) Dispositif et procédé permettant une communication hors bande dans un dispositif de charge sans fil, procédé et système
WO2020222415A1 (fr) Dispositif de charge sans fil, procédé et système de négociation de classe d'énergie par utilisation de communication sans fil à courte portée
WO2021230703A1 (fr) Dispositif de réception d'énergie sans fil et procédé de communication mis en œuvre par un dispositif de réception d'énergie sans fil
WO2021215793A1 (fr) Dispositif de réception d'énergie sans fil et dispositif de transmission d'énergie sans fil et
WO2020218800A1 (fr) Dispositif de charge sans fil, procédé et système de mise à jour de micrologiciel
WO2023287219A1 (fr) Procédé et dispositif de détermination de taille de données maximale conformément à une vitesse de communication dans un système de transmission de puissance sans fil
WO2022164271A1 (fr) Procédé et dispositif pour connecter des dispositifs au moyen d'une communication bluetooth et intra-bande dans un système de transmission d'énergie sans fil
WO2022098156A1 (fr) Procédé et dispositif de protection de la confidentialité de l'utilisateur dans un système de charge sans fil par ble
WO2022045863A1 (fr) Appareil de transmission d'énergie sans fil et appareil de réception d'énergie sans fil
WO2021235864A1 (fr) Procédé de transmission d'énergie sans fil et procédé de réception d'énergie sans fil
WO2022015021A1 (fr) Récepteur d'énergie sans fil, émetteur d'énergie sans fil et procédé de communication entre un récepteur d'énergie sans fil et un émetteur d'énergie sans fil
WO2020213980A1 (fr) Procédé de commande de puissance liaison de communication dans un système de transmission de puissance sans fil et appareil associé
WO2024075967A1 (fr) Procédé et dispositif de réalisation d'une recharge sans fil en mode haute puissance avec une authentification rapide dans un système de transmission d'énergie sans fil
WO2024111787A1 (fr) Procédé et dispositif de commande de paramètres liés à la puissance pour une charge rapide dans un système de transmission d'énergie sans fil
WO2023204633A1 (fr) Procédé et dispositif se rapportant à une exigence temporelle pour un message d'application dans un système de transmission d'énergie sans fil
WO2024101599A1 (fr) Procédé et dispositif de définition de profil de charge en mode haute puissance dans un système de transmission d'énergie sans fil
WO2024058554A1 (fr) Procédé et dispositif pour effectuer une connexion ble pour une recharge sans fil dans un système de transmission d'énergie sans fil
WO2024123157A1 (fr) Procédé et dispositif de changement de profil de charge en fonction de l'état de communication dans un système de transmission d'énergie sans fil
WO2024101600A1 (fr) Procédé et dispositif de commande de puissance pour une charge rapide dans un système de transmission de puissance sans fil
WO2023146373A1 (fr) Procédé et dispositif d'authentification basés sur une mise en mémoire cache préalable dans un système de transmission d'énergie sans fil
WO2023075570A1 (fr) Procédé et dispositif d'authentification dans un système de transfert d'énergie sans fil
WO2023106840A1 (fr) Procédé et dispositif liés à une exigence temporelle pour un message d'application dans un système d'émission d'énergie sans fil
WO2023106827A1 (fr) Procédé et dispositif se rapportant à une demande de temps pour un message d'application dans un système de transmission de puissance sans fil
WO2023033540A1 (fr) Procédé et appareil de communication et de détection nfc pendant la charge dans un système de transmission d'énergie sans fil

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23875037

Country of ref document: EP

Kind code of ref document: A1