Wireless Charging System Using Secure Wireless Charging Protocols
First Claim
1. A computer-implemented method comprising:
- receiving data describing a charging request from a target object;
generating a challenge responsive to the charging request;
sending the challenge to the target object;
receiving a response from the target object;
verifying the response to determine that the response matches the challenge and a first set of secret data shared with a tagging device;
determining that a location associated with the target object satisfies a safe charging range responsive to the verification of the response; and
instructing a power transmitter associated with the target object to transmit power wirelessly to a power receiver associated with the target object responsive to the verification of the response and the determination that the location satisfies the safe charging range.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosure includes a system and method for charging a target object wirelessly. The system includes a processor and a memory storing instructions that when executed cause the system to: receive data describing a charging request from a target object; generate a challenge responsive to the charging request; send the challenge to the target object; receive a response from the target object; verify the response to determine that the response matches the challenge and a first set of secret data shared with a tagging device; determine that a location associated with the target object satisfies a safe charging range responsive to the verification of the response; and instruct a power transmitter associated with the target object to transmit power wirelessly to a power receiver associated with the target object responsive to the verification of the response and the determination that the location satisfies the safe charging range.
254 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving data describing a charging request from a target object; generating a challenge responsive to the charging request; sending the challenge to the target object; receiving a response from the target object; verifying the response to determine that the response matches the challenge and a first set of secret data shared with a tagging device; determining that a location associated with the target object satisfies a safe charging range responsive to the verification of the response; and instructing a power transmitter associated with the target object to transmit power wirelessly to a power receiver associated with the target object responsive to the verification of the response and the determination that the location satisfies the safe charging range. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising a computer usable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
receive data describing a charging request from a target object; generate a challenge responsive to the charging request; send the challenge to the target object; receive a response from the target object; verify the response to determine that the response matches the challenge and a first set of secret data shared with a tagging device; determine that a location associated with the target object satisfies a safe charging range responsive to the verification of the response; and instruct a power transmitter associated with the target object to transmit power wirelessly to a power receiver associated with the target object responsive to the verification of the response and the determination that the location satisfies the safe charging range. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a processor; and a memory storing instructions that, when executed, cause the system to; receive data describing a charging request from a target object; generate a challenge responsive to the charging request; send the challenge to the target object; receive a response from the target object; verify the response to determine that the response matches the challenge and a first set of secret data shared with a tagging device; determine that a location associated with the target object satisfies a safe charging range responsive to the verification of the response; and instruct a power transmitter associated with the target object to transmit power wirelessly to a power receiver associated with the target object responsive to the verification of the response and the determination that the location satisfies the safe charging range. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification