Some wireless chargers interfere with CarKey. Apple is looking for the solution

carkey

Apple has registered a patent that talks about the possibility of CarKey technology adapting the way you work when wireless chargers are nearby. Right now we have the possibility of opening doors and starting cars without having to insert the key anywhere. With CarKey we can even use the Apple Watch to open the vehicle.

"Wireless Charging Interference Mitigation" is a license registered by Apple that shows how the company wants to prevent CarKey owners from finding that they cannot unlock their cars.

Remote keyless systems allow users to use keys to perform certain actions that would otherwise require our interaction. By carrying electronic keys that operate at wireless communication frequencies, these can control wirelessly vehicle door locks and vehicle ignition functions.

Altered either by someone else's friends, hackers, or altered by other devices that operate on the same frequency. It does not mean that if we find other devices we cannot use our keys. But if there could be interference and it might malfunction. we don't want that and less of the devices coming from Apple.

During wireless power transfer operations, wireless power signals are transmitted from power transmitter circuits to receiving circuits. During transfer operations, there is a risk that wireless power signals from circuits may interfere.

Apple's proposed solution is to first detect the risk of interference and then take steps to avoid it. The idea is that in the best case, a user doesn't even have to know that there was a potential problem. In the worst case, you will be asked to adjust settings and ready.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.