Sign In to Follow Application
View All Documents & Correspondence

A Secure Wireless Charging System And Method Thereof

Abstract: A SECURE WIRELESS CHARGING SYSTEM AND METHOD THEREOF A secure wireless charging system and method thereof is disclosed. The system includes a wireless power transmitter, a plurality of coil, an access control reader, at least one processor and a memory. The wireless power transmitter is configured to generate and transmit wireless power signals. The plurality of coil is positioned to receive the wireless power signals from the wireless power transmitter, wherein each coil is associated with a specific charging location. The access control reader is configured to authenticate and authorize devices for wireless charging at each charging location. The processor in communication with the wireless power transmitter, the plurality of coils, and the access control reader. The memory is in communication with the at least one processor. The memory stores instructions executable by the at least one processor for controlling the operation of the secure wireless charging system.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
14 February 2024
Publication Number
36/2025
Publication Type
INA
Invention Field
ELECTRICAL
Status
Email
Parent Application

Applicants

PREEYARIKA INNOVATIONS PRIVATE LIMITED
1101, Floor-11, Plot-4/404, Jaywant Tower, Pandit Madan Mohan Malviya Marg, Mumbai, Maharashtra, 400034, India

Inventors

1. NIHARIKA GUPTA
1101, Floor-11, Plot-4/404, Jaywant Tower, Pandit Madan Mohan Malviya Marg, Mumbai, Maharashtra, 400034, India

Specification

Description:TECHNICAL FIELD
[001] The present invention relates generally to a secure wireless charging system and method thereof.
BACKGROUND
[002] Wireless charging has been widely used in commercial applications such as for charging smart-phones, smart-watches, wireless earbuds, etc. Typical wireless charging mechanisms include inductive coupled based wireless charging mechanisms and resonant coupled based wireless charging mechanisms. Inductive coupling-based wireless charging mechanisms use the magnetic field to transfer energy from a transmitter coil of a charger to a receiver coil of an electrical device. Resonant coupling-based wireless charging mechanisms use electromagnetic field to transfer energy from the transmitter coil of the charger to the receiver coil of the electrical device.
[003] In this mode, the target device may draw its operating power from the initiator-provided electromagnetic field. In the active communication mode, both the initiator device and the target device communicate by alternately generating their own fields. A device deactivates its RF field while the device is waiting for data from another device. In this mode, both devices may initiate an NFC session since each device has a power supply, but such increases the costs, the size and the complexity of the devices. Also, in current charging mechanisms, in order to realize wireless charging, the transmitting device and the receiving device must follow the same wireless charging protocol (e.g., wireless power consortium (WPC QI), power matters alliance (PMA) and Alliance for Wireless Power (A4WP)). The short charging distance and the charging protocol restriction greatly limited the application of wireless charging.
[004] Therefore, there is a need of a system which overcomes the aforementioned problems.
SUMMARY
[005] Embodiments of the present disclosure present technological improvements as solutions to one or more of the above-mentioned technical problems.
[006] Before the present subject matter relating to a secure wireless charging system and method thereof, it is to be understood that this application is not limited to the particular system described, as there can be multiple possible embodiments which are not expressly illustrated in the present disclosure. It is also to be understood that the terminology used in the description is for the purpose of describing the implementations or versions or embodiments only and is not intended to limit the scope of the present subject matter.
[007] This summary is provided to introduce aspects related to a secure wireless charging system and method thereof. This summary is not intended to identify essential features of the claimed subject matter nor is it intended for use in determining or limiting the scope of the present subject matter.
[008] In an embodiment, a secure wireless charging system and method thereof is disclosed. The system includes a wireless power transmitter, a plurality of coil, an access control reader, at least one processor and a memory. The wireless power transmitter is configured to generate and transmit wireless power signals. The plurality of coil is positioned to receive the wireless power signals from the wireless power transmitter, wherein each coil is associated with a specific charging location. The access control reader is configured to authenticate and authorize devices for wireless charging at each charging location. The processor in communication with the wireless power transmitter, the plurality of coils, and the access control reader. The memory is in communication with the at least one processor. The memory stores instructions executable by the at least one processor for controlling the operation of the secure wireless charging system.
[009] In another embodiment, a method for operating a secure wireless charging system, the method includes the step of transmitting wireless power signals from a wireless power transmitter to a plurality of coils associated with specific charging locations. The method includes the step of authenticating and authorizing devices for wireless charging at each charging location using an access control reader. The method includes the step of controlling the power transmitted to each charging location based on authentication and authorization information. The method includes the step of storing authentication data, charging history, and system configurations in a memory. The method includes the step of monitoring and mitigating potential security threats to the secure wireless charging system.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
[0010] The foregoing detailed description of embodiments is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the disclosure, there is shown in the present document example constructions of the disclosure; however, the disclosure is not limited to the specific system or method disclosed in the document and the drawings.
[0011] The present disclosure is described in detail with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the drawings to refer various features of the present subject matter.
[0012] Figure 1 shows a wireless charging pad and a plurality of mobile systems which utilize wireless charging, according to one illustrated implementation.
[0013] Figure 2 shows a block diagram illustrating an exemplary wireless charging system, according to one illustrated implementation.
[0014] Figure 3 shows a flow diagram of a method of performing access control, according to one illustrated implementation.
[0015] In the above accompanying drawings, a non-underlined number relates to an item identified by a line linking the non-underlined number to the item. When a number is non-underlined and accompanied by an associated arrow, the non-underlined number is used to identify a general item at which the arrow is pointing.
[0016] Further, the figures depict various embodiments of the present subject matter for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the present subject matter described herein.

DETAILED DESCRIPTION
[0017] Some embodiments of this disclosure, illustrating all its features, will now be discussed in detail. The words "comprising," "having," "containing," and "including," and other forms thereof, are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items. It must also be noted that as used herein and in the appended claims, the singular forms "a," "an," and "the" include plural references unless the context clearly dictates otherwise. Although a secure wireless charging system and method thereof, similar or equivalent to those described herein can be used in the practice or testing of embodiments of the present disclosure, the exemplary, a secure wireless charging system and method thereof is now described.
[0018] Various modifications to the embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. For example, although the present disclosure will be described in the context of a secure wireless charging system and method thereof, one of ordinary skill in the art will readily recognize a secure wireless charging system and method thereof can be utilized in any situation. Thus, the present disclosure is not intended to be limited to the embodiments illustrated but is to be accorded the widest scope consistent with the principles and features described herein.
[0019] In an embodiment, a secure wireless charging system and method thereof is disclosed. the system includes a wireless power transmitter, a plurality of coil, an access control reader, at least one processor and a memory. The wireless power transmitter is configured to generate and transmit wireless power signals. The plurality of coil is positioned to receive the wireless power signals from the wireless power transmitter, wherein each coil is associated with a specific charging location. The access control reader is configured to authenticate and authorize devices for wireless charging at each charging location. The processor in communication with the wireless power transmitter, the plurality of coils, and the access control reader. The memory is in communication with the at least one processor. The memory stores instructions executable by the at least one processor for controlling the operation of the secure wireless charging system.
[0020] In another implementation, the wireless power transmitter utilizes resonant inductive coupling to transmit power wirelessly to the plurality of coils.
[0021] In another implementation, each coil is positioned within a charging pad, and the charging pads are strategically placed to form a charging area.
[0022] In another implementation, the access control reader employs biometric authentication, RFID technology, or a combination thereof to authenticate and authorize devices for wireless charging.
[0023] In another implementation, at least one processor is further configured to monitor and control the power transmitted to each charging location based on authentication and authorization information received from the access control reader.
[0024] In another implementation, the memory stores data related to authorized devices, charging history, and system configurations.
[0025] In another implementation, a communication module enabling communication with an external network for remote monitoring, configuration, and management of the secure wireless charging system.
[0026] In another implementation, at least one processor is further configured to detect and mitigate potential security threats to the wireless charging system.
[0027] In another embodiment, a method for operating a secure wireless charging system, the method includes the step of transmitting wireless power signals from a wireless power transmitter to a plurality of coils associated with specific charging locations. The method includes the step of authenticating and authorizing devices for wireless charging at each charging location using an access control reader. The method includes the step of controlling the power transmitted to each charging location based on authentication and authorization information. The method includes the step of storing authentication data, charging history, and system configurations in a memory. The method includes the step of monitoring and mitigating potential security threats to the secure wireless charging system.
[0028] In another implementation, the method includes the step of receiving a near field communication (NFC) initiation signal.
[0029] Figure 1 shows a wireless charging pad and a plurality of mobile systems which utilize wireless charging, according to one illustrated implementation.
[0030] In an embodiment, a wireless charging system 100 which includes a charging system or base station in the form of a charging pad. Similar to the cradle, the charging pad includes a wireless power transmitter 204 and an NFC reader 118. The charging pad is coupled to a power source 106 and may optionally be communicatively coupled with one or more host computer systems. The charging pad includes an interface surface on top of which a user can place one or more user systems 102A-H (collectively 214) which utilize wireless charging to charge their respective chargeable power sources 110. In the non-limiting example, the user device 102 include a keyboard, a watch, a smartphone, a tablet computer, a notebook computer, a headset, and a speaker.
[0031] In the same embodiment, an access control reader includes a wireless communications transceiver, an inductive coupler, an internal power source, and a processor. Wireless communications transceiver may be, for example, a Bluetooth® transceiver configured to receive data over one or more Bluetooth®-standard communication channels. In some embodiments, wireless communications transceiver is configured to receive data over one or more Bluetooth Low Energy (BLE) communication channels. However, the disclosure should be understood as encompassing all suitable wireless communication methods that may be used to allow access control reader to communicate with the mobile device.
[0032] The wireless power receiver 112 may include an induction coil which receives power transmitted from an induction coil of a wireless power transmitter 116 of the cradle. The cradle is operative to wirelessly charge the chargeable power source 110 of the mobile self-shopping system. For example, the cradle may be placed in a kiosk at a store or market where the self-shopping system may be provided to a customer for use while shopping. The cradle includes the wireless power transmitter 116 and the NFC reader 118. The NFC reader 118 may receive and transmit information through the NFC protocol at short distances.
[0033] Each user device 102 includes a wireless power receiver and an NFC chip 114. In operation, the user device 102 may request initiation of an NFC session by sending a message to the charging pad over a wireless charge channel established between a wireless power receiver 112 of the respective mobile system and the wireless power transmitter 116 of the charging pad. Responsive to receiving the request from a particular mobile system 102, the NFC reader 118 of the charging pad may initiate an NFC session with the mobile system 214, thereby allowing the mobile systems 102 to request initiation of an. NFC session without the requirement of having an active NFC reader 118. Access control application is used to initiate transmittal of an access request, using wireless communications transceiver. In particular, access control application may retrieve an access token stored on token repository and transmit the access token using wireless communications transceiver.
[0034] In some embodiments, the NFC channel initiation request message may be coded in the form of an end-of-charge message (e.g., EPT0x01), which may normally be used to signal to the cradle that the chargeable power source is fully charged. In such instances, the cradle is configured to interpret the repurposed end-of-charge message received from the self-shopping system as a request for initiation of an NFC session, rather than a “charge complete” notification. Since EPT messages are well defined in the WPC v1.1 standard, this method may be used irrespective of silicon implementations and/or suppliers for the wireless power receiver and wireless power transmitter integrated circuits. WPC codes other than the end-of-charge EPT code may also be used.
[0035] In another embodiment, a user device may include one or more processor(s), one or more memory components, input/output (I/O) components, and communication interfaces. The user device also includes an NFC ta coupled to the one or more processors. The user device further includes a wireless power receiver which is coupled to a chargeable power source through a power distribution and regulation component.
[0036] Figure 2 shows a block diagram illustrating an exemplary wireless charging system, according to one illustrated implementation.
[0037] In an embodiment, the wireless charging system 200 may include a charging pad 202, a magnetic field transfer circuit 204, and an electrical load 206. Charging pad 202 may be any suitable device that can provide electrical power and can use the electrical power to generate a changing/alternating magnetic field. In some embodiments, charging pad 202 among other things may include a power source (not shown), a transmitter coil configured to generate the changing/alternating magnetic field using the electrical power received from the power source and a transmitter circuit configured to electrically connect the power source and the transmitter coil. In some other embodiments, the power source may be an external power source connected to charging pad 202 through a port (not shown). For example, the port may be a USB port, a mini-USB port, a micro-USB port, a USB-C port, or other types of suitable ports that provide electrical power to the transmitter circuit for the purpose of generating a changing/alternating magnetic field.
[0038] In some embodiments, charging pad 202 and electrical load 206 may additionally include in-band modulation/demodulation (e.g., one or more processors configured to demodulate/extract instructions from control information and/or modulate/code instructions to generate control information) and may transmit to and/or receive from each other control information using an in-band communication based on modulation of a current or voltage of magnetic field transfer circuit 204. The in-band modulation/demodulation may include a microprocessor, a digital signal processor (DSP), a microcontroller, a field programmable gate array (FPGA), a system on chip (SoC) and/or other suitable devices or chips capable of processing the control information. The control information may also include other functions such as stop charging, foreign objective detection, fast charging mode activation, etc.
[0039] Figure 3 shows a flow diagram of a method of performing access control, according to one illustrated implementation.
[0040] In an embodiment, at block 71, the access control reader wirelessly transfers power to mobile device. In particular, mobile device is brought within sufficient proximity of access control reader such that inductive coupler is within inductive coupling distance of inductive coupler. At block, low-power island is activated. In particular, low-power island (as opposed to high-power island) are activated as low-power island operates at a lower voltage and/or lower clock frequency than high-power island, and therefore draws less power from battery than high-power island would. At block 73, access control application is activated. Access control application is used to generate access requests for transmittal via wireless communications transceiver. In the present embodiment, an access request comprises an access token, although in some embodiments an access request may comprise alternative or additional information that will be used for validation, such as a current location of mobile device. At block, wireless communications transceiver detects the access token transmitted from wireless communications transceiver. At block, access control reader validates the access token. In some embodiments, in order to validate the received access token, processor accesses a database of pre-validated access tokens stored in token repository, and compares the received access token to the pre-validated access tokens. block 77, processor communicates with portal lock to temporarily transition portal lock from a locked state to an unlocked state. The user may then access the portal.
[0041] In an embodiment, in order to protect battery of the user device, the user device may be configured to automatically power down (either fully or into a low-power mode) following transmission of the access token, or else after a predetermined period of time has elapsed since the boot process.
[0042] Although the description provides implementations of a secure wireless charging system and method thereof, it is to be understood that the above descriptions are not necessarily limited to the specific features or methods or systems. Rather, the specific features and methods are disclosed as examples of implementations for a secure wireless charging system and method thereof.
, Claims:We claim:
1. A secure wireless charging system, comprising:
a wireless power transmitter configured to generate and transmit wireless power signals;
a plurality of coil positioned to receive the wireless power signals from the wireless power transmitter, wherein each coil is associated with a specific charging location;
an access control reader configured to authenticate and authorize devices for wireless charging at each charging location;
at least one processor in communication with the wireless power transmitter, the plurality of coils, and the access control reader;
a memory in communication with the at least one processor, wherein the memory stores instructions executable by the at least one processor for controlling the operation of the secure wireless charging system.

2. The system as claimed in claim 1, wherein the wireless power transmitter utilizes resonant inductive coupling to transmit power wirelessly to the plurality of coils.

3. The system as claimed in claim 1, wherein each coil is positioned within a charging pad, and the charging pads are strategically placed to form a charging area.

4. The system as claimed in claim 1, wherein the access control reader employs biometric authentication, RFID technology, or a combination thereof to authenticate and authorize devices for wireless charging.

5. The system as claimed in claim 1, wherein at least one processor is further configured to monitor and control the power transmitted to each charging location based on authentication and authorization information received from the access control reader.

6. The system as claimed in claim 1, wherein the memory stores data related to authorized devices, charging history, and system configurations.

7. The system as claimed in claim 1, further comprising a communication module enabling communication with an external network for remote monitoring, configuration, and management of the secure wireless charging system.

8. The system as claimed in claim 1, wherein at least one processor is further configured to detect and mitigate potential security threats to the wireless charging system.

9. A method for operating a secure wireless charging system, comprising:
transmitting wireless power signals from a wireless power transmitter to a plurality of coils associated with specific charging locations;
authenticating and authorizing devices for wireless charging at each charging location using an access control reader;
controlling the power transmitted to each charging location based on authentication and authorization information;
storing authentication data, charging history, and system configurations in a memory;
monitoring and mitigating potential security threats to the secure wireless charging system.

10. The method as claimed in claim 9, further comprising the step of receiving a near field communication (NFC) initiation signal.

Documents

Application Documents

# Name Date
1 202421010216-STATEMENT OF UNDERTAKING (FORM 3) [14-02-2024(online)].pdf 2024-02-14
2 202421010216-POWER OF AUTHORITY [14-02-2024(online)].pdf 2024-02-14
3 202421010216-FORM FOR STARTUP [14-02-2024(online)].pdf 2024-02-14
4 202421010216-FORM FOR SMALL ENTITY(FORM-28) [14-02-2024(online)].pdf 2024-02-14
5 202421010216-FORM 1 [14-02-2024(online)].pdf 2024-02-14
6 202421010216-FIGURE OF ABSTRACT [14-02-2024(online)].pdf 2024-02-14
7 202421010216-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [14-02-2024(online)].pdf 2024-02-14
8 202421010216-EVIDENCE FOR REGISTRATION UNDER SSI [14-02-2024(online)].pdf 2024-02-14
9 202421010216-DRAWINGS [14-02-2024(online)].pdf 2024-02-14
10 202421010216-DECLARATION OF INVENTORSHIP (FORM 5) [14-02-2024(online)].pdf 2024-02-14
11 202421010216-COMPLETE SPECIFICATION [14-02-2024(online)].pdf 2024-02-14
12 Abstract1.jpg 2024-04-26