System and method for wireless intercommunication and power delivery

ABSTRACT

A wireless signal may supply a wireless power signal to a device to power the device for an authentication. If the device is authenticated, the wireless signal may be adjusted to provide power to the device. If the device is not authenticated, the wireless signal may be adjusted to avoid providing power to the device.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of U.S. patentapplication Ser. No. 15/209,249 filed on Jul. 13, 2016, which is herebyincorporated by reference in its entirety.

BACKGROUND

There has been a demonstrable increase in recent years in the number andtypes of devices that are adapted with wireless communicationcapabilities. For example, sensor devices, mechanical equipment, andstand-alone appliances are just some of the devices that traditionallyhave not had communication capabilities but which are now being adaptedto perform wireless communications. The Internet of Things (IoT) is aterm that has been used to refer to a network formed from the numerousdevices and objects, i.e., things, that now have the capability toexchange data. Experts estimate that the IoT will consist of almost 50billion objects by 2020.

Battery life is an ever-present problem for many of the devices that arenow being adapted with wireless communication capabilities. Constraintson the size and weight of many of these devices restrict the size of thebatteries, which, in turn, limits the battery's capacity.

SUMMARY

Systems and methods for wirelessly supplying power to remote devices aredescribed. In an example embodiment, a wireless power supply transmits awireless power signal which may be, for example, a wireless signal, suchas a Wi-Fi signal, to a device so that the device has or obtainssufficient power to authenticate with the system controlling thewireless power supply. The authentication can be done with the wirelesspower supply or with another wireless transceiver. If the device isauthenticated, the wireless power supply can adjust the wireless signalin order to provide power to the device. If the device can not beauthenticated, then the wireless power supply can adjust the wirelesssignal in order to avoid providing power to the device.

The adjustment can be spatial or temporal. For example, in a spatialadjustment the shape of the supplied signal beam can be adjusted. In atemporal adjustment, the signal beam can be turned on for a longer orshorter time period. For example, the power signal can have a duty cyclethat may be increased when the right indication is received.

In an example scenario, the wireless power supply adjusts the signal sothat it reaches the particular device that has been authenticated. Ifthe device is not authenticated, the wireless power signal may beadjusted to avoid providing power to the device.

Embodiments also concern providing indications to a sender of wirelesssignals so that these wireless signals can be adjusted. An indicationcan be sent to the sender related to strength of multiple signals toallow the sender to adjust the signals. Alternately, location info maybe provided from the device to the sender.

Additional advantages will be set forth in part in the description whichfollows or may be learned by practice. It is to be understood that boththe foregoing general description and the following detailed descriptionare exemplary and explanatory only and are not restrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate embodiments and together with thedescription, serve to explain the principles of the methods and systems.

FIG. 1 is a block diagram depicting an example device without adedicated power supply.

FIG. 2 is a block diagram illustrating an example wireless power supplyunit.

FIG. 3 is a flow diagram depicting example processing for authenticatingand powering a device.

FIG. 4 is a flow diagram depicting example processing performed at adevice.

FIG. 5 depicts an example physical area with a plurality of devices inproximity of a wireless access point.

FIG. 6A is a flow diagram depicting exemplary processing for providingpower to a device.

FIG. 6B is a flow diagram depicting an exemplary processing forperiodically sweeping regions with wireless power for devices.

FIGS. 7A-D are diagrams that illustrate power usage and power needs in aphysical area.

FIG. 8 is a flow diagram of exemplary processing for adjusting wirelesssignals.

FIG. 9 depicts an example physical area with a plurality of device inproximity to a wireless access point.

FIG. 10 is a flow diagram of example processing for adjusting wirelesssignals.

FIG. 11 depicts an example physical area with a plurality of device inproximity to a wireless access point.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The technology to supply power wirelessly to devices, such as IoTdevices, using the same frequencies and antennas as those used forintercommunication is rapidly becoming a reality. Devices that areadapted to receive power via an antenna may not require a battery atall. However, where devices are adapted to receive power via an antenna,it is desirable to maintain some degree of control over which devices inan area consume wireless power. For example, if there are three wirelessdevices in a physical area, it may be desired to communicate power toonly one of the three devices.

Supplying power wirelessly has been attempted over short distances. Forexample, systems have attempted inductive charging of toothbrushes andcellphones over short distances. However, inductive charging techniquesare limited to extremely short distances, e.g., the device must beresting upon or inches above the charging base. Moreover, inductivecharging techniques provide no ability to authenticate the particulardevice that receives the charge. For example, existing techniques lackthe ability to charge only your toothbrush (as opposed to another'stoothbrush) or only your smart phone (as opposed to someone else's).

Disclosed herein are systems and methods for delivering a wireless powersignal to a device in order to power the device for an authentication.If the device is authenticated, a wireless power signal is adjusted toprovide power to the particular device. If the device is notauthenticated, the wireless power signal may be adjusted to avoidproviding power to the particular device.

The wireless power signal transmitter can be part of a system withanother wireless data transceiver that receives requests from low powerdevices. For example, the device without a dedicated power supply cancommunicate with Bluetooth low energy (BLE) or ZigBee (an IEEE802.15.4-based specification) transceiver. The wireless power signaltransmitter can then be alerted by the another wireless datatransceiver. For example, the another wireless data transceiver can beconnected to the wireless power signal transmitter using a networkconnection or Internet of Things (IoT) hub. In one example, wirelesspower, such as power provided on a WiFi band, can provide enough energyfor device to emit BLE or ZigBee signals that a BLE or ZigBee hub usedfor IoT can relay back to the wireless power signal transmitter.

FIG. 1 illustrates an exemplary device 102 suitable for receiving powerwirelessly. The device 102 may be a computing device, such as, anInternet of Things (IoT) device or another user device. In an exampleembodiment, the device 102 may be a wireless power consuming devicewithout its own power supply or battery. In another example scenario,the device 102 may be a device without a dedicated power supply thatrelies upon other devices to provide power to it. In another embodiment,the device 102 may have a power supply that has limited or depletedavailable power. The device 102 may be adapted to communicate using theInternet Protocol (IP) and, as such, may be considered part of theInternet of Things. The device 102 may be adapted for any suitablepurpose including, for example, as a sensor such as those used forsensing light, temperature, accelerometer or other relevantenvironmental characteristic.

As shown in FIG. 1, device 102 comprises an antenna 104 that is adaptedto receive and transmit signals in cooperation with atransmitter/receiver unit 112. The antenna 104 and thetransmitter/receiver unit 112 may be controlled by processor 106 toreceive wireless signals that provide power to device 102. The wirelesssignals may be any signals that are suitable to provide power to device102 including, for example, radio-wave, electromagnetic induction,magnetic resonance, or capacitive coupling. In an example scenario, theantenna 104 is adapted to receive wireless signals, such as WiFisignals. The power accumulation unit 110 is adapted to obtain power fromthe received signal. Power accumulation unit 110 may be adapted toderive power in any suitable manner. In an example embodiment, poweraccumulation unit 110 may be adapted to derive power using resonantinductive coupling.

Referring to FIG. 1, the transmitter/receiver 112 is communicativelycoupled with the processor 106. The processor 106 is communicativelycoupled to computer-readable medium or memory 108 which has storedtherein instructions that when executed by the processor 106 cause theprocessor 106 control the various components of device 102 so as tooperate as described herein.

FIG. 2 illustrates an exemplary wireless power supply unit 202 adaptedto communicate or deliver power wirelessly to devices such as thatdepicted in FIG. 1. The wireless power supply unit 202 may be any devicethat is suitable to wirelessly communicate power. In an exampleembodiment, the wireless power supply unit 202 may be a dedicatedwireless supply unit. In another embodiment, the wireless power supplyunit 202 may be an access point that intercommunicates data with otherdevices, such as a wireless access point, in addition to providing powerwirelessly.

Referring to FIG. 2, the wireless power supply unit 202 includes anantenna 204. In an example embodiment, the antenna 204 is adapted tospatially arrange its output signal using beamforming techniques.Beamforming is used to focus signals toward certain physical areas orregions. In an example scenario, beamforming may be used to focussignals toward a particular area where particular devices are located.Beamforming concentrates signal transmission so that more of the signalreaches targeted devices.

Beamforming, which is sometimes referred to as spatial filtering, is asignal processing technique that typically uses a sensor array, such asmulti-antenna array 204, for directional signal transmission and/orreception. This may be achieved by combining elements in a phased arrayin such a way that signals at particular angles (and thus regions inspace) experience constructive interference while others experiencedestructive interference. The improvement compared with omnidirectionalreception/transmission is known as the receive/transmit gain (or loss).Such beamforming techniques have been devised to enhance wireless datadelivery to devices. However, beamforming techniques may be leveraged toenhance wireless power delivery and minimize transmission power waste.Referring to FIG. 2, the directional control logic 214 (or processor206), which is communicatively coupled with transmitter/receiver 212,may be used to control the signals at the multi-antenna array 204.

Referring to FIG. 2, the wireless power supply unit 202 may include oneor more processors 206, which may execute instructions of a computerprogram to perform any of the features described herein. Theinstructions may be stored in any type of computer-readable medium ormemory 208, to configure the operation of the processor 206. Forexample, instructions may be stored in a read-only memory (ROM), randomaccess memory (RAM), hard drive, removable media, such as a UniversalSerial Bus (USB) drive, compact disk (CD) or digital versatile disk(DVD), floppy disk drive, or any other desired electronic storagemedium. Instructions may also be stored in an attached (or internal)hard drive.

The wireless power supply unit 202 may be a uniprocessor systemincluding one processor or a multiprocessor system including severalprocessors (e.g., two, four, eight, or another suitable number). Theprocessors may be any suitable processors capable of executinginstructions. For example, in various aspects, the processor(s) may begeneral-purpose or embedded processors implementing any of a variety ofinstruction set architectures (ISAs), such as the x86, PowerPC, SPARC,or MIPS ISAs, or any other suitable ISA. In multiprocessor systems, eachof the processors may commonly, but not necessarily, implement the sameISA. The wireless power supply unit 202 may be or may be associated witha computing device may include one or more output devices, such as adisplay (not shown) and may include one or more output devicecontrollers, such as a video processor. There may also be one or moreuser input devices, such as a remote control, keyboard, mouse, touchscreen, microphone, etc.

When the wireless power supply unit 202 acts as an access point, datamay be received from and sent to devices such as device 102 without adedicated power supply. The wireless power supply unit 202 may alsoinclude one or more network interfaces, such as input/output circuits(e.g., a network card) to communicate with a network. The networkinterface may be a wired interface, wireless interface, or a combinationof the two. In some embodiments, the network interface may include amodem (e.g., a cable modem), and the network.

As discussed above, another wireless data transceiver can be associatedwith the wireless power supply unit 202. The another wireless datatransceiver can include components similar to that shown in FIG. 2 withrespect to wireless power supply unit 202. Such a wireless datatransceiver can communicate with the device 102 using a low powerprotocol such as BLE or ZigBee used in IoT communications.

FIGS. 3, 4, 6A, 6B, 8, and 10 and other portions of the disclosureillustrate operations and methods according to some aspects of thedisclosure. The methods may be performed by a network operator, monitoror user, for example. Decision making for the steps of FIGS. 3, 4, 6A,6B, 8, and 10 and other disclosed methods can be local at the wirelesspower supply unit 202 (or another transceiver such as a BLE or ZigBeetransceiver). Alternately, decision making can be remotely done orenhanced with information that is provided from a remote location, suchas from a logic controller that can be implemented by a computing deviceand/or software. FIG. 3 depicts a flow diagram of an example process forwirelessly communicating or otherwise delivering power to a device. Asshown, at block 302, a wireless signal is supplied to at least onedevice in order for the device(s) to have power sufficient forperforming a particular task, such as an authentication procedure.

Power can be provided to devices to allow for the device to be poweredfor an authentication process. For example, the wireless power supplyunit 202 can sweep with power sufficient for authentication but not forfull operation of the device. Alternately, the device may have beeninitially authenticated, but lost power and now has to bere-authenticated.

In an example embodiment, the wireless power supply unit 202, which maybe a wireless data access point like a Wi-Fi access point, supplies awireless signal that is received at the device 102. The wireless signalis conditioned and provided such that the signal supplies power todevice 102, for example, so that device 102 is able to perform anauthentication procedure. After being powered by wireless power supplyunit 202, the device 102 can authenticate with d wireless power supplyunit 202 or can authenticate with another transceiver, such as a BLE orZigBee transceiver. In an example scenario, power supply unit 202 maysupply the wireless signal as part a sweep of a room or other location.Alternately, an omnidirectional wireless signal may be provided.

At block 304, the at least one device 102 is authenticated, receives anauthorization, or is otherwise involved in an establishment of trustbetween the device 102 and other devices and/or a network. In an exampleembodiment, device 102 and wireless power supply unit 202 (or anothertransceiver) may perform a series of communication exchanges allowingwireless power supply unit 202 (or another transceiver) to confirm orauthenticate that it is, in fact, communicating with device 102. It willbe appreciated that any suitable authentication method or standard maybe employed. For example, Wi-Fi Protected Access (WPA), Wi-Fi ProtectedAccess II (WPA2), Wired Equivalent Privacy (WEP) or some otherauthentication protocol may be used.

Once the device 102 is authenticated by wireless power supply unit 202(or another transceiver), additional power for general operation ofdevice 102 may be provided to the device 102. For example, the wirelesspower supply unit 202 can store the location of the device 102 andperiodically supply device 102 with power sufficient for normaloperations. If the device 102 is not authenticated, power may bewithdrawn from the device. For example, the wireless power supply unit202 can avoid powering the region containing device 102.

If at block 304, the power supply unit 202 (or another transceiver) hasauthenticated the device 202, at block 306, the power supply unit 202adjusts the wireless signal to power the at least one device 102. Theamount of power provided by the signal can be adjusted spatially (bychanging where a power supplying signal is sent) or temporally (bychanging how often a power supplying signal is sent). In an exampleembodiment, the wireless power supply unit 202, which may be adapted toalso operate as a Wi-Fi access point, may use beamforming to communicatethe signal. In an example embodiment, the wireless power supply unit 202may maintain in memory 208 a map of physical areas or regions to beprovided with the wireless signal. Regions may be mapped to indicatewhether or how often a signal should be provided into that region.Wireless power supply unit 202 may rely upon the stored information indetermining how and where to communicate signals.

If at block 304 the device 202 is not authenticated, at block 306, thewireless signal may be adjusted to avoid the at least one device.Alternately, the device 202 can be provided power to reattemptauthentication. The signal can be adjusted spatially or temporally. Forexample, power supply 202 may adjust the transmission of power signalsso as to avoid the particular device that has not been authenticated.

FIG. 4 illustrates a method of operation at a device 102. The device 102may be a device without a dedicated power supply that at block 402, thedevice 102 receives from power supply/Wi-Fi access point 202 a signalwith sufficient power for the device 102 to perform an authenticationprocess with the power supply 202 or another network device or service.The provided power may be limited to an amount that needed to performauthentication. In one embodiment, the provide power is insufficient fornormal operation.

After receiving power to authenticate, at block 404, device 102communicates with the power supply/Wi-Fi access point 202 (or anothertransceiver) in an attempt to authenticate itself. Authentication may beperformed using any suitable type of authentication. For example, Wi-FiProtected Access (WPA), Wi-Fi Protected Access II (WPA2), WiredEquivalent Privacy (WEP) or some other authentication protocol may beused.

At block 406, assuming it has been authenticated, device 102 receivesadditional power from power/supply/wireless/Wi-Fi access point 202 foruse in normal operations of device 102. This additional power may beprovided in a signal, such as a dedicated power signal or a data signal.The wireless signal may be adjusted to power the particular device whichmay be one of a plurality of devices. In an example embodiment, thespatial adjustment may be performed by beamforming using the wirelesspower supply unit 202 acting as a wireless access point.

In one embodiment, power from signals, such as WiFi signals, areaccumulated by device 102. Power storage elements such as capacitors andthe like can be used to store power.

The device 102 can use the power from the power supplying device to sendauthentication messages to another location or using a separateprotocol. In one example, the stored power may be only sufficient toallow a response over Bluetooth LE (BLE) or ZigBee instead of WiFi. Inthis embodiment, an authentication request over BLE or ZigBee can bedone instead of WiFi.

Alternately, a “knock knock” request over BLE or ZigBee can be used toask to get power faster to make authentication request e.g. over WiFi(which is a multi-step expansion of blocks 304/306 and 404/406).

FIG. 5 illustrates an example using methods such as those of FIGS. 3 and4. In an example scenario, when the devices 504, 506 and 508 areauthenticated, the wireless access point 502 can adjust the wirelesssignal in order to provide power to the device for normal operations.The wireless access point 502 may maintain in memory a mapping ofregions to which it should supply a wireless signal using beamforming orsome other technique to supply power to devices 504, 506, and 508. Themapping can be stored locally or remotely. Device 510, which may havefailed authentication by access point 502 (or by some othertransceiver), does not receive a power signal from access point 502 andmay eventually lack power to continue to operate. New devices such as,for example, device 512, may be added to the physical area, e.g.,installed by a user or moved into the area by a user. The device 512 maybe detected by sweeps of the region performed by access point 502 usingbeam shifting or by doing a period of omnidirectional wirelesstransmissions.

Omnidirectional signals can include signals sent in all directions, beamshifting can include directional signals. Beam shifting may be achievedby combining elements in a phased array in such a way that signals atparticular angles (and thus regions in space) experience constructiveinterference.

FIG. 6A illustrates an exemplary method of providing power to a device.

At block 602, a computing device, such as a power providing ormonitoring device, such as wireless power unit 202 of FIG. 2, sweeps theservice space with a pilot (e.g., a signal without data) or some othertransmission such as a data signal. The sweep of the service space canprovide power to devices to allow them to identify and or authenticatethemselves.

At block 604, for each device identified in the service space, unit 202determines whether the device is blacklisted or is otherwise a devicethat is not supposed to communicate with other devices on the networkbecause, for example, it failed authentication, of low priority, notcompatible, or any other reason.

If a device is determined to be blacklisted or otherwise of lowpriority, at block 608, the power provider 202 may skip transmission to,or reduce power provided to a space containing the device. Powerprovider unit 202 may store information identifying a level of power (ifany) that should be provided to a device along with a mapping thatindicates the power to be provided to different sectors or spaces.

If at block 604 a particular device was determined not to be blacklistedor otherwise designated as low priority, at block 606, the powerprovider unit 202 transmits and the particular device receives power.

At block 610, the power provider unit 202 determines whether the devicehas enough power to communicate. If so, at block 612, the device cancommunicate when it receives sufficient power. The communication can bewith the wireless power provider 202 or with another transceiver using aprotocol such as BLE or ZigBee.

If not, at block 614, the power provider unit 202 determines that thedevice needs to absorb more power and continues processing at block 602.

FIG. 6B illustrates an exemplary method of periodically sweeping regionswith wireless power for devices. As shown in this example, the providedwireless power can be adjusted in each sector. For example, wirelesspower can be boosted or resumed when transmissions from a sector arereceived; and wireless power can be reduced when enough power has beensupplied or when the space is blacklisted or low priority.

At block 620, a power provider such as unit 202 can periodically sweepthe service space with pilot transmissions.

At block 622, the unit 202 determines if relevant transmissions havebeen received from this space. If so, at block 624 the power providermay resume transmission or adjust power for the space from whichrelevant transmissions have received from the device.

At block 626, the unit 202 determines whether other transmissions suchas, for example, those transmitting data, have previously sent enoughdata to power space. If it is determined that sufficient power has notpreviously been sent, at block 630, the unit 202 determines whetherpower transmission is not reaching intended space. If it is determinedthat power transmissions are likely not reaching the intended space, atblock 632, the unit 202 determines if the space with the device isblacklisted or at a low priority. If it is determined that the space isnot blacklisted or at a low priority, at block 634, the unit 202 sends apilot transmission. Processing then continues at block 620.

If any of the determinations at blocks 626, 630 and 632 are positive,processing continues at block 628, where the power provider 202 may skiptransmission or reduce power for space. Processing then continues atblock 620.

In an example embodiment, devices may be classified in one of threecategories: 1. Authenticated devices that should be provided withcommunication and other capabilities, and power as appropriate; 2.Devices which failed authentication that should NOT be provided power orintercommunication; and 3. Devices which have not yet been authenticatedwhich should be provided sufficient power to attempt authentication.Depending upon the classification of a particular device, the systemsteers intercommunication and power to given volumes.

In order to accommodate the first category of devices, the system mayprovide sufficient power delivery to volumes known to containauthenticated devices. Given that intercommunication itself providespower, power delivery may be as simple as performing normalintercommunication with the understanding and/or acknowledgment thatsaid transmissions deliver enough power. Alternatively, power deliverymay be as complex as tracking the estimated power delivered by priorcommunications and further sending a minimum amount of additionalintercommunication to authenticated devices, which may include signalscrafted to deliver higher power but no meaningful data payload to thedevice.

In order to accommodate the second category of devices, the system mayignore devices that failed authentication in order to avoid furtherdelivery of power to the unauthenticated devices. The system mayactively avoid transmitting energies into volumes containing devicesthat failed authentication, which may alter the typical beamformingdecisions for best transmission to authenticated devices.

In order to accommodate the third category of devices, the powerdistribution scheme may provide at least intermittent/residual powerdelivery to locations that are not known to contain authenticateddevices. This may be done by means as simple as intermittentomnidirectional transmission, or as complicated as tracking the energytransmitted to certain volumes and assigning beamforming paths totransmit into regions insufficiently “painted” by previous/recenttransmissions, effectively performing “trickle feed” transmissions.

It may be desirable for devices to send an initiation signal to thesystem indicating that the device is trying to amass enough power toattempt authentication. When the system receives such a signal (if it isnot determined to be from an unauthorized device or occurring toofrequently from a device never attempting authentication (i.e. a powerleech)), the system may decide to direct more transmission energy tothat device or toward that volume in order to reduce the overall time toreceive sufficient power.

It may be advantageous to link these concepts, so the initiation signalis a device's response to a system challenge provided in the “tricklefeed” power delivery transmission, which could contain cryptographic orcomputed data useful in authentication; if the system confirms validityof the signal, it initiates further intercommunications and powerdelivery to “energize” the authenticated device.

FIGS. 7A-D illustrate exemplary mappings of power distribution andenergy needs over an area, which may be an indoor or outdoor area suchas dwelling, office space, park, sports complex, etc. The squaresdepicted in FIGS. 7A-D corresponded to sectors which can be provided asignal. It will be appreciated that while the sectors are depicted assquares, the sectors may be angular regions in space.

The darkness of shading applied to the boxes indicates the level ofpower sent (or needed to be sent) to the particular sector. A triangleidentifies a device without a dedicated power supply. A circle with aslash indicates a blocked area. A question mark indicates an area thatmay not have been fully powered.

FIG. 7A illustrates energy levels used by devices in a prescribed area.In the scenario depicted in FIG. 7A, two devices, such as user devicesor clients, one in sector B2 and one in sector D2, are usingcommunications. The client in sector B2 is not in the center of thearea. As a result, energy communicated to the client bleeds into thesurrounding areas as indicated by the shading applied to the adjacentsectors. The client in sector D2 is located in the center of the area,but, as indicated by the darkness of the region, high concentration ofenergy is communicated to the sector. As a consequence, energy bleedsinto surrounding areas.

FIG. 7B illustrates power transmission needs of various devices in thepredetermined area. In the scenario depicted in FIG. 7B, five deviceswithout dedicated power supplies, depicted with triangles, have varyinglevels of need for power as indicated by the varying levels of shadingapplied to the triangles. Five sectors (A3-6), depicted using circleswith a slash, have been blocked. Other areas, indicated by questionmarks, may contain devices that have not accumulated the power needed toask for power. These devices should receive minimal “trickle” power.

FIG. 7C illustrates an overlay of the power needs as depicted in FIG. 7Bon the spatial energy used as depicted in FIG. 7A. As shown in FIG. 7C,although some areas have power needs met (e.g., sectors A2, B1-2, C1-3,D1-3, E1-3), many areas need more energy (often just a “trickle”).

FIG. 7D shows that there are power needs beyond communicationsrequirements to cover. For example, the sectors containing deviceswithout dedicated power supplies (A1, C4, D6, E5 and F2) may need tohave some additional power provided beyond that provided for the devicesin sectors B2 and D2. The circle symbol, in FIG. 7D, is used to denoteareas that do not need more power.

FIGS. 8-11 illustrate embodiments concerning providing indications to asender of wireless signals so that these wireless signals can beadjusted. The signals can be adjusted spatially or temporally adjusted.

FIG. 8 illustrates a first exemplary method for determining locationinformation for a device, such as, for example, a device that needs tobe powered. In an example scenario, a power provider may use thelocation information, for example, to update its transmissions. Thelocation processing may be implemented by any suitable device including,for example, a wireless access point or a wireless power supplyingdevice.

At block 802, a signal is provided to a device. The signal may be, forexample, a power or wireless signal. The device that receives the signalmay be an actively powered device or a device without its own powersupply.

At block 804, location info is received from the device. The locationinformation may be any suitable information with which location may bedetermined including, for example, an accelerometer reading or positionindication. Based on the location information, the sender of wirelesspower determines the current or future location of the device. Thelocation info can be sent to wireless power supply unit 202 or toanother transceiver, such as a BLE or ZigBee transceiver, incommunication with wireless power supply unit 202.

At block 806, signal to the device is adjusted based on location info.The signals can be adjusted spatially or temporally. For example, beamshifting may be used by a wireless or power provider to provide a signalto the current or future location of the device.

FIG. 9 illustrates the example location processing of FIG. 8. In theexample scenario depicted in FIG. 9, device 908 indicates to sender 902that it has moved by communicating location information 904. The sender902, which may be an access point or wireless power provider, uses thelocation information to adjust which sectors are provided data or power.

FIG. 10 illustrates a second exemplary method for determining locationof a device. This method describes another way for a power provider orwireless access point to determine that it should update itstransmissions. The location processing may be implemented by anysuitable device including both actively powered devices and deviceswithout their own dedicated power supply.

At block 1002, multiple signals are received at a device. The multiplesignals may be provided at different times or concurrently. The signalscan be adjusted spatially or temporally. The signals may be wirelesssignals or power signals. The device analyzes the strength of thereceived signals to determine the stronger signal.

At block 1004, an indication related to strength of the signals isprovided to the sender of the signals in order that the sender mayadjust the signals. For example, a time stamp of the stronger signal maybe used if the signals are not concurrent. Alternately, the signals mayinclude a signal ID which can be provided back to the signal provider bythe device. The sender may then adjust the signal in response to theinformation. The signals can be adjusted spatially or temporally. Theindication can be sent directly to wireless power supply unit 202 or toanother transceiver, such as a BLE or ZigBee transceiver, incommunication with wireless power supply unit 202.

FIG. 11 illustrates an example of the location processing of FIG. 10. Inthe example scenario depicted in FIG. 11, sender 1102 sends signals intoregions A and B. Device 1108 indicates to the sender 1102 with a signalstrength indication 1104 which of the signals is stronger. The sender1102 can then adjust the region in which a signal is sent into.

While the methods and systems have been described in connection withpreferred embodiments and specific examples, it is not intended that thescope be limited to the particular embodiments set forth, as theembodiments herein are intended in all respects to be illustrativerather than restrictive.

Unless otherwise expressly stated, it is in no way intended that anymethod set forth herein be construed as requiring that its steps beperformed in a specific order. Accordingly, where a method claim doesnot actually recite an order to be followed by its steps or it is nototherwise specifically stated in the claims or descriptions that thesteps are to be limited to a specific order, it is no way intended thatan order be inferred, in any respect. This holds for any possiblenon-express basis for interpretation, including: matters of logic withrespect to arrangement of steps or operational flow; plain meaningderived from grammatical organization or punctuation; the number or typeof embodiments described in the specification.

As used in the specification and the appended claims, the singular forms“a,” “an,” and “the” include plural referents unless the context clearlydictates otherwise. Ranges may be expressed herein as from “about” oneparticular value, and/or to “about” another particular value. When sucha range is expressed, another embodiment includes from the oneparticular value and/or to the other particular value. Similarly, whenvalues are expressed as approximations, by use of the antecedent“about,” it will be understood that the particular value forms anotherembodiment. It will be further understood that the endpoints of each ofthe ranges are significant both in relation to the other endpoint, andindependently of the other endpoint.

“Optional” or “optionally” means that the subsequently described eventor circumstance may or may not occur, and that the description includesinstances where said event or circumstance occurs and instances where itdoes not.

Throughout the description and claims of this specification, the word“comprise” and variations of the word, such as “comprising” and“comprises,” means “including but not limited to,” and is not intendedto exclude, for example, other components, integers or steps.“Exemplary” means “an example of” and is not intended to convey anindication of a preferred or ideal embodiment. “Such as” is not used ina restrictive sense, but for explanatory purposes.

Disclosed are components that may be used to perform the disclosedmethods and systems. These and other components are disclosed herein,and it is understood that when combinations, subsets, interactions,groups, etc. of these components are disclosed that while specificreference of each various individual and collective combinations andpermutation of these may not be explicitly disclosed, each isspecifically contemplated and described herein, for all methods andsystems. This applies to all aspects of this application including, butnot limited to, steps in disclosed methods. Thus, if there are a varietyof additional steps that may be performed it is understood that each ofthese additional steps may be performed with any specific embodiment orcombination of embodiments of the disclosed methods.

The present methods and systems may be understood more readily byreference to the following detailed description of preferred embodimentsand the examples included therein and to the Figures and their previousand following description.

As will be appreciated by one skilled in the art, the methods andsystems may take the form of an entirely hardware embodiment, anentirely software embodiment, or an embodiment combining software andhardware aspects. Furthermore, the methods and systems may take the formof a computer program product on a computer-readable storage mediumhaving computer-readable program instructions (e.g., computer software)embodied in the storage medium. More particularly, the present methodsand systems may take the form of web-implemented computer software. Anysuitable computer-readable storage medium may be utilized including harddisks, CD-ROMs, optical storage devices, or magnetic storage devices.

Embodiments of the methods and systems are described below withreference to block diagrams and flowchart illustrations of methods,systems, apparatuses and computer program products. It will beunderstood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, respectively, may be implemented by computerprogram instructions. These computer program instructions may be loadedon a general purpose computer, special purpose computer, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions which execute on the computer or other programmabledata processing apparatus create a means for implementing the functionsspecified in the flowchart block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that may direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including computer-readableinstructions for implementing the function specified in the flowchartblock or blocks. The computer program instructions may also be loadedonto a computer or other programmable data processing apparatus to causea series of operational steps to be performed on the computer or otherprogrammable apparatus to produce a computer-implemented process suchthat the instructions that execute on the computer or other programmableapparatus provide steps for implementing the functions specified in theflowchart block or blocks.

Accordingly, blocks of the block diagrams and flowchart illustrationssupport combinations of means for performing the specified functions,combinations of steps for performing the specified functions and programinstruction means for performing the specified functions. It will alsobe understood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, may be implemented by special purposehardware-based computer systems that perform the specified functions orsteps, or combinations of special purpose hardware and computerinstructions.

It will be apparent to those skilled in the art that variousmodifications and variations may be made without departing from thescope or spirit. Other embodiments will be apparent to those skilled inthe art from consideration of the specification and practice disclosedherein. It is intended that the specification and examples be consideredas exemplary only, with a true scope and spirit being indicated by thefollowing claims.

The invention claimed is:
 1. A system comprising: at least one device;and a computing device configured to: transmit a wireless signal,wherein the wireless signal is configured to supply power to the atleast one device to enable the at least one device to performauthentication; authenticate the at least one device; and adjust thewireless signal to supply additional power to the at least one device.2. The system of claim 1, wherein the wireless signal is spatiallyadjusted or temporally adjusted.
 3. The system of claim 1, wherein theat least one device does not have a dedicated power supply.
 4. Thesystem of claim 1, wherein the computing device is further configured tosupply a sweeping wireless signal to detect devices to power.
 5. Thesystem of claim 1, wherein the wireless signal is adjusted to supply thepower to the at least one device for authentication.
 6. The system ofclaim 1, wherein the computing device comprises a wireless access point.7. The system of claim 6, wherein the at least one device is configuredto intercommunicate with the wireless access point.
 8. A non-transitorycomputer-readable medium storing instructions that, when executed,cause: transmitting a wireless signal, wherein the wireless signal isconfigured to supply power to at least one device to enable the at leastone device to perform for authentication; authenticating the at leastone device; and adjusting the wireless signal to supply additional powerto the at least one device.
 9. The computer-readable medium of claim 8,wherein the wireless signal is spatially adjusted or temporallyadjusted.
 10. The computer-readable medium of claim 8, wherein the atleast one device does not have a dedicated power supply.
 11. Thecomputer-readable medium of claim 8, wherein the instructions, whenexecuted, further cause: providing a sweeping wireless signal to detectdevices to power.
 12. The computer-readable medium of claim 8, whereinthe wireless signal is adjusted to supply the power to the at least onedevice for authentication.
 13. A system comprising: at least one device;and a computing device configured to: provide a wireless signal, whereinthe wireless signal is configured to supply power to the at least onedevice to enable the at least one device to perform authentication;authenticate the at least one device; receive location information fromthe at least one device; and adjust the signal to provide additionalpower to the at least one device based on the location information. 14.The system of claim 13, wherein the wireless signal is spatiallyadjusted or temporally adjusted.
 15. The system of claim 13, wherein thecomputing device comprises a wireless access point.
 16. The system ofclaim 13, wherein the computing device is further configured to receivethe location information from an accelerometer at the at least onedevice.
 17. The system of claim 13, wherein the computing device isfurther configured to transmit multiple arranged signals.
 18. The systemof claim 17, wherein the computing device is further configured toadjust the signals based on an indication related to strength of thesignals associated with the location information.
 19. The system ofclaim 13, wherein the computing device is further configured to: utilizethe location information to adjust power provided to one or more devicesin a region, among a plurality of regions, of a map.
 20. Anon-transitory computer-readable medium storing instructions that, whenexecuted, cause: providing a wireless signal, wherein the wirelesssignal is configured to supply power to the at least one device toenable the at least one device to perform authentication; authenticatingthe at least one device; receiving location information from the atleast one device; and adjusting the signal to provide additional powerto the at least one device based on the location information.
 21. Thecomputer-readable medium of claim 20, wherein the wireless signal isspatially adjusted or temporally adjusted.
 22. The computer-readablemedium of claim 20, wherein the instructions, when executed, furthercause receiving the location information from an accelerometer at thedevice.
 23. The computer-readable medium of claim 20, wherein theinstructions, when executed, further cause transmitting of multiplearranged signals.
 24. The computer-readable medium of claim 23, whereinthe instructions, when executed, further cause adjusting the signalsbased on an indication related to strength of the signals associatedwith the location information.
 25. The computer-readable medium of claim20, wherein the instructions, when executed, further cause: utilizingthe location information to adjust power provided to one or more devicesin a region, among a plurality of regions, of a map.