Various embodiments of the present disclosure relate generally to electrical circuit communication architecture and, more particularly, to bidirectional communication architecture for tolerating coupled currents.
Inverters, such as those used to drive a motor in an electric vehicle, for example, are responsible for converting High Voltage Direct Current (HVDC) into Alternating Current (AC) to drive the motor. Common-mode transients occur during power device switching and when one side of a floating high voltage battery terminal is shorted to ground or subject to an electro-static discharge. These voltage transients result in fast edges, which create bursts of common-mode current through the galvanic isolation, and affect an operation of the gate drivers.
The present disclosure is directed to overcoming one or more of these above-referenced challenges.
In some aspects, the techniques described herein relate to a system including: an inverter configured to convert DC power from a battery to AC power to drive a motor, wherein the inverter includes: a galvanic interface configured to separate a high voltage area from a low voltage area; a low voltage message manager in the low voltage area; a high voltage message manager in the high voltage area, and configured to communicate with the low voltage message manager; and a point-of-use message manager in the high voltage area, and configured to communicate with the high voltage message manager.
In some aspects, the techniques described herein relate to a system, further including: the battery configured to supply the DC power to the inverter; and the motor configured to receive the AC power from the inverter to drive the motor.
In some aspects, the techniques described herein relate to a system, wherein the point-of-use message manager is in a power module including one or more power device switches for the inverter, and wherein the inverter further includes: a single-wire data bus connecting the high voltage message manager to the point-of-use message manager, wherein the point-of-use message manager is configured to communicate with the high voltage message manager using the single-wire data bus, and a timer configured to measure a period of time that the single-wire data bus is in a dominant phase or a recessive phase, wherein the low voltage message manager, the high voltage message manager, and the point-of-use message manager are configured to communicate using a logic 0 bit and a logic 1 bit, wherein the logic 0 bit is defined as a dominant phase measured by the timer for a first period of time followed by a recessive phase measured for a second period of time, and the logic 1 bit is defined as a dominant phase measured by the timer for the first period of time followed by a recessive phase measured for a third period of time that is longer than the second period of time for the logic 0 bit.
In some aspects, the techniques described herein relate to a system including: a galvanic interface configured to separate a high voltage area from a low voltage area; a low voltage message manager in the low voltage area; a high voltage message manager in the high voltage area, and configured to communicate with the low voltage message manager; and a point-of-use message manager in the high voltage area, and configured to communicate with the high voltage message manager.
In some aspects, the techniques described herein relate to a system, further including: a single-wire data bus connecting the high voltage message manager to the point-of-use message manager, wherein the point-of-use message manager is configured to communicate with the high voltage message manager using the single-wire data bus.
In some aspects, the techniques described herein relate to a system, further including: a first switched current source configured to operate with the high voltage message manager to drive the single-wire data bus to a power rail; a second switched current source configured to operate with the point-of-use message manager to drive the single-wire data bus to the power rail; a third switched current sink configured to operate with the high voltage message manager to drive the single-wire data bus to a ground rail; and a fourth switched current sink configured to operate with the point-of-use message manager to drive the single-wire data bus to the ground rail.
In some aspects, the techniques described herein relate to a system, wherein one or more of the first switched current source or the second switched current source is configured to overdrive a state of the single-wire data bus as driven by an operation of the third switched current sink or the fourth switched current sink, or wherein one or more of the third switched current sink or the fourth switched current sink is configured to overdrive a state of the single-wire data bus as driven by an operation of the first switched current source or the second switched current source.
In some aspects, the techniques described herein relate to a system, wherein the first switched current source, the second switched current source, the third switched current sink, and the fourth switched current sink have a higher current capability than an expected worst case externally coupled current.
In some aspects, the techniques described herein relate to a system, further including: a first comparator configured to operate with the high voltage message manager to differentiate a high state or a low state of the single-wire data bus; and a second comparator configured to operate with the point-of-use message manager to differentiate a high state or a low state of the single-wire data bus.
In some aspects, the techniques described herein relate to a system, wherein the point-of-use message manager is in a power module including one or more power device switches for an inverter.
In some aspects, the techniques described herein relate to a system, wherein one or more of the low voltage message manager, the high voltage message manager, or the point-of-use message manager includes a timer configured to measure a period of time that the single-wire data bus is in a dominant phase or a recessive phase.
In some aspects, the techniques described herein relate to a system, wherein the low voltage message manager, the high voltage message manager, and the point-of-use message manager are configured to communicate using a logic 0 bit and a logic 1 bit, wherein the logic 0 bit is defined as a dominant phase measured by the timer for a first period of time followed by a recessive phase measured for a second period of time, and the logic 1 bit is defined as a dominant phase measured by the timer for the first period of time followed by a recessive phase measured for a third period of time that is longer than the second period of time for the logic 0 bit.
In some aspects, the techniques described herein relate to a system, wherein an interrupting manager, among the low voltage message manager, the high voltage message manager, and the point-of-use message manager, is configured to interrupt a transmitting manager, among the low voltage message manager, the high voltage message manager, and the point-of-use message manager, by transmitting a logic 0 bit or a logic 1 bit during the second period of time or the third period of time, and the transmitting manager is configured to yield communication to the interrupting manager within a single bit transmission.
In some aspects, the techniques described herein relate to a system, wherein the low voltage message manager, the high voltage message manager, and the point-of-use message manager are configured to communicate with any of other managers among the low voltage message manager, the high voltage message manager, and the point-of-use message manager.
In some aspects, the techniques described herein relate to a method for communicating with power device switches for an inverter, the method including: communicating a message between a high voltage message manager of the inverter and a point-of-use message manager for the power device switches using a single-wire data bus.
In some aspects, the techniques described herein relate to a method, further including: measuring, with a timer of the inverter, a period of time that the single-wire data bus is in a dominant phase or a recessive phase.
In some aspects, the techniques described herein relate to a method, wherein the communicating the message includes using a logic 0 bit and a logic 1 bit, wherein the logic 0 bit is defined as a dominant phase measured by the timer for a first period of time followed by a recessive phase measured for a second period of time, and the logic 1 bit is defined as a dominant phase measured by the timer for the first period of time followed by a recessive phase measured for a third period of time that is longer than the second period of time for the logic 0 bit.
In some aspects, the techniques described herein relate to a method, further including transmitting a logic 0 bit or a logic 1 bit during the second period of time or the third period of time, to interrupt a message communication within a single bit transmission.
In some aspects, the techniques described herein relate to a method, further including: applying one or more of a current source or a current sink to the single-wire data bus.
In some aspects, the techniques described herein relate to a method, wherein the one or more of the current source or the current sink has a higher current capability than an expected worst case externally coupled current.
Additional objects and advantages of the disclosed embodiments will be set forth in part in the description that follows, and in part will be apparent from the description, or may be learned by practice of the disclosed embodiments. The objects and advantages of the disclosed embodiments will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosed embodiments, as claimed.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate various exemplary embodiments and together with the description, serve to explain the principles of the disclosed embodiments.
Both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the features, as claimed. As used herein, the terms “comprises,” “comprising,” “has,” “having,” “includes,” “including,” or other variations thereof, are intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements, but may include other elements not expressly listed or inherent to such a process, method, article, or apparatus. In this disclosure, unless stated otherwise, relative terms, such as, for example, “about,” “substantially,” and “approximately” are used to indicate a possible variation of ±10% in the stated value. In this disclosure, unless stated otherwise, any numeric value may include a possible variation of ±10% in the stated value.
The terminology used below may be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain specific examples of the present disclosure. Indeed, certain terms may even be emphasized below; however, any terminology intended to be interpreted in any restricted manner will be overtly and specifically defined as such in this Detailed Description section. For example, in the context of the disclosure, the switching devices may be described as switches or devices, but may refer to any device for controlling the flow of power in an electrical circuit. For example, switches may be metal-oxide-semiconductor field-effect transistors (MOSFETs), bipolar junction transistors (BJTs), insulated-gate bipolar transistors (IGBTs), or relays, for example, or any combination thereof, but are not limited thereto.
Various embodiments of the present disclosure relate generally to electrical circuit communication architecture and, more particularly, to bidirectional communication architecture for tolerating coupled currents.
Inverters, such as those used to drive a motor in an electric vehicle, for example, are responsible for converting High Voltage Direct Current (HVDC) into Alternating Current (AC) to drive the motor. A three phase inverter may include a bridge with six power device switches (for example, power transistors such as IGBT or MOSFET) that are controlled by Pulse Width Modulation (PWM) signals generated by a controller. An inverter may include three half-H bridge switches to control the phase voltage, upper and lower gate drivers to control the switches, a PWM controller, and glue logic between the PWM controller and the gate drivers. The PWM controller may generate signals to define the intended states of the system. The gate drivers may send the signals from the PWM controller to the half-H bridge switches. The half-H bridge switches may drive the phase voltage. The inverter may include an isolation barrier between low voltage and high voltage planes. Signals may pass from the PWM controller to the half-H bridge switches by passing across the isolation barrier, which may employ optical, transformer-based, or capacitance-based isolation. PWM signals may be distorted when passing through the glue logic, which may include resistive, capacitive, or other types of filtering. PWM signals may be distorted when passing through the gate driver, due to the galvanic isolation barrier and other delays within the gate driver. PWM signals may be distorted when the signals processed by the half-H switch via the gate driver output.
Gate drivers may tolerate common-mode transients that occur during field-effect transistor (FET) switching and when one side of the floating high voltage terminal is shorted to ground or subject to an electro-static discharge. These voltage transients may result in fast edges, which may create bursts of common-mode current through the galvanic isolation. A gate driver may need to demonstrate common-mode transient immunity (CMTI) in order to be effective and safe.
Gate drivers may have a high-voltage domain in common to the voltage plane of an associated FET. Further, high-voltage planes may be supplied by a flyback converter that may be isolated through a transformer from the low-voltage plane. The high-voltage domain supply may be used to power circuits which source and sink gate current to drive the FET and which may detect FET faults so the faults can be acted upon and/or communicated to the low-voltage domain. Gate drivers may include a galvanic channel dedicated to FET commands, and one or more bidirectional or unidirectional galvanic channels dedicated to FET communications.
High current switching transients may create strong electro-magnetic (EM) fields that may couple into nearby metal traces. The magnitude and frequency of coupled currents may depend upon the layout of the FET packaging solution and the direction and length of metal traces between the FET and the control integrated circuit (IC). For example, typical values for coupled currents may be up to 1 A at AC frequencies up to 100 MHz. Typically, within a circuit, the gate driver IC may be placed far enough away from the FET that high EM fields do not couple directly into the internal metal traces within the gate driver IC. The gate driver is placed a distance from EM fields such that induced currents within the circuitry are below levels that will cause malfunction of the gate driver, or a metal shield is placed between the gate driver and the source of EM fields to protect the gate driver circuitry. The output terminals of the gate driver that connect to the FET are exposed to the EM fields at the point where the output terminals are no longer covered by a shield. The gate driver switches large currents (such as 5 A to 15 A, for example) through these exposed terminals. The switched large currents are generally greater in magnitude than the EM-induced currents. The gate driver is able to overdrive the induced currents to maintain control of the FETs. The high side of the gate drivers and the FET may share a common ground and a gate control signal trace, both of which may be susceptible to coupled currents.
Gate drivers may turn on low-resistance switches to source and sink gate currents. Series resistors may sometimes be added to limit gate current. Switched gate currents may be larger than coupled currents in order to maintain control of their respective FETs.
Gate drivers may be able to sense FET operating voltages or currents in order to provide feedback and react to faults. Over-current faults may typically be detected by sensing the FET drain to source voltage and comparing the sensed voltage to a reference value. Sensed voltages may be heavily filtered to reject coupled currents. Filtering may slow down the response to fault conditions, resulting in delays in response. For example, the rate of current increase due to a low resistance short circuit may reach damaging levels prior to being detected by the heavily filtered drain to source voltage detection strategy. The resulting short circuit may damage the FET or the vehicle, prior to being detected and shut off.
According to one or more embodiments, a FET driver circuit may provide rapid over-current detection by either shunt current sensing or by diverting a fraction of the load current through a parallel FET that may have a current sensing circuit. Utilizing either strategy may require a “point-of-use IC” where sensing circuitry is in close proximity to the FET. Even if a point-of-use IC and a remote controller are resistant to EM fields, communication between the point-of-use IC and remote controller remains susceptible to induced currents. Point-of-use ICs have been implemented in low EM field applications, such as smart FETs for automotive applications. However, point-of-use ICs have not been used in high EM field applications, due to a lack of a high-speed messaging architecture that is robust against coupled currents. A high EM field may be a field (i) that induces a current within an IC that is in excess of an operating current of the IC and leads to malfunction, or (ii) that induces a differential voltage within an IC which is in excess of the operating differential voltage and leads to malfunction. A high EM field may be a field that is greater than approximately 10 A or approximately 100V, for example.
According to one or more embodiments, a high-speed, bidirectional communication architecture may tolerate coupled currents in order to enable point-of-use ICs to be placed in high EM field applications. The point-of-use ICs may reduce the detection and response times to allow for safe control and management of FETs within the inverter systems.
Some architectures may disclose an isolation between a microcontroller in a primary plane and a load in a secondary plane that may be controlled by a switch. This isolation is achieved by transformers, which may be inherently susceptible to induced currents, which are generated by an EM field during high current switching of the loads. Some architectures may not compensate for induced currents within the transformer primary or secondary. Some communication architectures designed to tolerate EM disturbances may include Local Interconnect Networks (LIN) and controller area network (CAN) systems.
A LIN single-wire bus architecture uses required external elements that may be connected to the LIN bus. These systems may describe the LIN architecture with a maximum data rate of 20 kB/s, where a bus low state is a logic 0 and a bus high state is a logic 1. The bus may be passively pulled up to a higher voltage using a 1 kOhm resistor and actively pulled down to a lower voltage using a switch with a maximum specified current limit of 200 mA. LIN driver current may be too low to reject coupled current, which may range from 100 mA to 1 A.
A CAN architecture has a two wire bus using passive bus load resistors and a message protocol. CAN architecture may have a maximum data rate of 5 MB/S, where a bus driver to a differential stage is a logic 0 and a bus passively pulled together is a logic 1. The bus may be passively pulled together using 120 Ohm termination resistors on either end of the bus and actively pulled down using a switch with a maximum specified current limit of 100 mA. The CAN bus may use a twisted pair architecture which may have a high common-mode rejection to coupled currents, unless the currents are so high as to rail the maximum voltage of the bus against the electrostatic discharge clamps. A 1 A induced current may be more than enough to rail the CAN bus in this manner, and thus CAN may not be an acceptable architecture for high EM field applications.
According to one or more embodiments, the problem of communication through large coupled currents may be solved utilizing the gate driver system described below.
Inverter 110 may include a low voltage area, where voltages are generally less than 5V, for example, and a high voltage area, where voltages may exceed 500V, for example. The low voltage area may be separated from the high voltage area by galvanic isolator 150. Inverter controller 300 may be in the low voltage area of inverter 110, and may send signals to and receive signals from low voltage upper phase controller 120. Low voltage upper phase controller 120 may be in the low voltage area of inverter 110, and may send signals to and receive signals from high voltage upper phase controller 130. Low voltage upper phase controller 120 may send signals to and receive signals from low voltage lower phase controller 125. High voltage upper phase controller 130 may be in the high voltage area of inverter 110. Accordingly, signals between low voltage upper phase controller 120 and high voltage upper phase controller 130 pass through galvanic isolator 150. High voltage upper phase controller 130 may send signals to and receive signals from point-of-use upper phase controller 142 in upper phase power module 140. Point-of-use upper phase controller 142 may send signals to and receive signals from upper phase switches 144. Upper phase switches 144 may be connected to motor 190 and battery 195. Upper phase switches 144 and lower phase switches 148 may be used to transfer energy from motor 190 to battery 195, from battery 195 to motor 190, from an external source to battery 195, or from battery 195 to an external source, for example. The lower phase system of inverter 110 may be similar to the upper phase system as described above.
The inverter controller 300 may include a set of instructions that can be executed to cause the inverter controller 300 to perform any one or more of the methods or computer based functions disclosed herein. The inverter controller 300 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices.
In a networked deployment, the inverter controller 300 may operate in the capacity of a server or as a client in a server-client user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment. The inverter controller 300 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a facsimile machine, a printer, a pager, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. In a particular implementation, the inverter controller 300 can be implemented using electronic devices that provide voice, video, or data communication. Further, while the inverter controller 300 is illustrated as a single system, the term “system” shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
As shown in
The inverter controller 300 may include a memory 304 that can communicate via a bus 308. The memory 304 may be a main memory, a static memory, or a dynamic memory. The memory 304 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like. In one implementation, the memory 304 includes a cache or random-access memory for the processor 302. In alternative implementations, the memory 304 is separate from the processor 302, such as a cache memory of a processor, the system memory, or other memory. The memory 304 may be an external storage device or database for storing data. Examples include a hard drive, compact disc (“CD”), digital video disc (“DVD”), memory card, memory stick, floppy disc, universal serial bus (“USB”) memory device, or any other device operative to store data. The memory 304 is operable to store instructions executable by the processor 302. The functions, acts or tasks illustrated in the figures or described herein may be performed by the processor 302 executing the instructions stored in the memory 304. The functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firm-ware, micro-code and the like, operating alone or in combination. Likewise, processing strategies may include multiprocessing, multitasking, parallel processing and the like.
As shown, the inverter controller 300 may further include a display 310, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid-state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined information. The display 310 may act as an interface for the user to see the functioning of the processor 302, or specifically as an interface with the software stored in the memory 304 or in the drive unit 306.
Additionally or alternatively, the inverter controller 300 may include an input device 312 configured to allow a user to interact with any of the components of inverter controller 300. The input device 312 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control, or any other device operative to interact with the inverter controller 300.
The inverter controller 300 may also or alternatively include drive unit 306 implemented as a disk or optical drive. The drive unit 306 may include a computer-readable medium 322 in which one or more sets of instructions 324, e.g. software, can be embedded. Further, the instructions 324 may embody one or more of the methods or logic as described herein. The instructions 324 may reside completely or partially within the memory 304 and/or within the processor 302 during execution by the inverter controller 300. The memory 304 and the processor 302 also may include computer-readable media as discussed above.
In some systems, a computer-readable medium 322 includes instructions 324 or receives and executes instructions 324 responsive to a propagated signal so that a device connected to a network 370 can communicate voice, video, audio, images, or any other data over the network 370. Further, the instructions 324 may be transmitted or received over the network 370 via a communication port or interface 320, and/or using a bus 308. The communication port or interface 320 may be a part of the processor 302 or may be a separate component. The communication port or interface 320 may be created in software or may be a physical connection in hardware. The communication port or interface 320 may be configured to connect with a network 370, external media, the display 310, or any other components in inverter controller 300, or combinations thereof. The connection with the network 370 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed below. Likewise, the additional connections with other components of the inverter controller 300 may be physical connections or may be established wirelessly. The network 370 may alternatively be directly connected to a bus 308.
While the computer-readable medium 322 is shown to be a single medium, the term “computer-readable medium” may include a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. The term “computer-readable medium” may also include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by a processor or that cause a computer system to perform any one or more of the methods or operations disclosed herein. The computer-readable medium 322 may be non-transitory, and may be tangible.
The computer-readable medium 322 can include a solid-state memory such as a memory card or other package that houses one or more non-volatile read-only memories. The computer-readable medium 322 can be a random-access memory or other volatile re-writable memory. Additionally or alternatively, the computer-readable medium 322 can include a magneto-optical or optical medium, such as a disk or tapes or other storage device to capture carrier wave signals such as a signal communicated over a transmission medium. A digital file attachment to an e-mail or other self-contained information archive or set of archives may be considered a distribution medium that is a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a computer-readable medium or a distribution medium and other equivalents and successor media, in which data or instructions may be stored.
In an alternative implementation, dedicated hardware implementations, such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement one or more of the methods described herein. Applications that may include the apparatus and systems of various implementations can broadly include a variety of electronic and computer systems. One or more implementations described herein may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations.
The inverter controller 300 may be connected to a network 370. The network 370 may define one or more networks including wired or wireless networks. The wireless network may be a cellular telephone network, an 802.11, 802.16, 802.20, or WiMAX network. Further, such networks may include a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols. The network 370 may include wide area networks (WAN), such as the Internet, local area networks (LAN), campus area networks, metropolitan area networks, a direct connection such as through a Universal Serial Bus (USB) port, or any other networks that may allow for data communication. The network 370 may be configured to couple one computing device to another computing device to enable communication of data between the devices. The network 370 may generally be enabled to employ any form of machine-readable media for communicating information from one device to another. The network 370 may include communication methods by which information may travel between computing devices. The network 370 may be divided into sub-networks. The sub-networks may allow access to all of the other components connected thereto or the sub-networks may restrict access between the components. The network 370 may be regarded as a public or private network connection and may include, for example, a virtual private network or an encryption or other security mechanism employed over the public Internet, or the like.
In accordance with various implementations of the present disclosure, the methods described herein may be implemented by software programs executable by a computer system. Further, in an exemplary, non-limited implementation, implementations can include distributed processing, component or object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement one or more of the methods or functionality as described herein.
Although the present specification describes components and functions that may be implemented in particular implementations with reference to particular standards and protocols, the disclosure is not limited to such standards and protocols. For example, standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) represent examples of the state of the art. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same or similar functions as those disclosed herein are considered equivalents thereof.
It will be understood that the operations of methods discussed are performed in one embodiment by an appropriate processor (or processors) of a processing (i.e., computer) system executing instructions (computer-readable code) stored in storage. It will also be understood that the disclosure is not limited to any particular implementation or programming technique and that the disclosure may be implemented using any appropriate techniques for implementing the functionality described herein. The disclosure is not limited to any particular programming language or operating system.
Upper phase power module 140A may include point-of-use upper phase A controller 142A and upper phase A switches 144A. Upper phase A switches 144A may include one or more groups of switches. As shown in
Communication manager 405 may control inter-controller communications to and from point-of-use upper phase A controller 142A and/or may control intra-controller communications between components of point-of-use upper phase A controller 142A. Functional safety controller 410 may control safety functions of point-of-use upper phase A controller 142A. Testing interface and controller 415 may control testing functions of point-of-use upper phase A controller 142A, such as end-of-line testing in manufacturing, for example. North thermal sensor 420A may sense a temperature at a first location in point-of-use upper phase A controller 142A, and south thermal sensor 420B may sense a temperature at a second location in point-of-use upper phase A controller 142A. Self-test controller 425 may control a self-test function of point-of-use upper phase A controller 142A, such as during an initialization of the point-of-use upper phase A controller 142A following a power on event of inverter 110, for example. Command manager 430 may control commands received from communication manager 405 issued to the north switches control and diagnostics controller 450N and south switches control and diagnostics controller 450S. Waveform adjuster 435 may control a waveform timing and shape of commands received from communication manager 405 issued to the north switches control and diagnostics controller 450N and south switches control and diagnostics controller 450S. Memory 440 may include one or more volatile and non-volatile storage media for operation of point-of-use upper phase A controller 142A. North switches control and diagnostics controller 450N may send one or more signals to north switches 144A-N to control an operation of north switches 144A-N, and may receive one or more signals from north switches 144A-N that provide information about north switches 144A-N. South switches control and diagnostics controller 450S may send one or more signals to south switches 144A-S to control an operation of south switches 144A-S, and may receive one or more signals from south switches 144A-S that provide information about south switches 144A-S. As stated above, the terms north and south are merely used for reference, and north switches control and diagnostics controller 450N may send one or more signals to south switches 144A-S, and south switches control and diagnostics controller 450S may send one or more signals to south switches 144A-N.
The gate driver 600 may include a message encoding scheme for a galvanic interface, where a logic 0 bit is defined as a dominant phase for a first period of time followed by a recessive phase for a second period of time, and a logic 1 bit is defined as a dominant phase for the first period of time followed by a recessive phase for a third period of time that is longer than the second period of time for the recessive phase for the logic 0 bit. For example, for a logic 0 bit, a dominant phase may include a dominant phase of approximately 500 nS, followed by a recessive phase of approximately 1 μS. For example, for a logic 1 bit, a dominant phase may include a dominant phase of approximately 500 nS, followed by a recessive phase of approximately 2 μS. In this example, the recessive phase of approximately 2 μS for the logic 1 bit is longer than the recessive phase of approximately 1 μS for the logic 0 bit.
MGR1 612 and MGR2 614 may include logic rules whereby galvanic transmitters may be placed into tri-state during the recessive phase, between the dominant phase and when communication over the galvanic interface 604 is unused, so that pulses travelling in the opposite direction may be detected by MGR1 612 and MGR2 614. Further, MGR1 612 and MGR2 614 may include logic rules such that the detection of pulses, during the recessive phases of data bits, is interpreted as an interrupt from the opposing MGR, resulting in the interrupted party yielding communication over the galvanic interface 604 to the interrupter (e.g., the respective MGR, MGR1 612 or MGR2 614). Tri-state refers to a transmitter that no longer drives two signal lines to the galvanic interface 604. Both transmitters (e.g. MGR1 612 or MGR2 614) may be in tri-state on both sides of the galvanic interface 604.
In tri-state, either transmitter may start sending data while the other side is available to listen. Both transmitters may simultaneously be in tri-state and then simultaneously start sending data. Here, neither receiver will see the data because both are sending data, and a transceiver cannot both send and receive data at the same time. One or more embodiments may describe a message protocol to ensure that this collision does not continue. One of the transmitters (e.g. MGR1 612 or MGR2 614) may start communicating using an interrupt bit that has a very long dominant phase (such as approximately 3 μS, for example). The other transmitter may start a message with a normal logic 0 bit or logic 1 bit, which has a shorter dominant phase (such as approximately 500 nS, for example). Either of the transmitters (e.g. MGR1 612 or MGR2 614) may be configured to begin a message with an interrupt and either may be configured to begin a message without an interrupt. However, both transmitters should not be configured to begin a message with an interrupt, and both transmitters should not configured to begin a message without an interrupt. One of the transmitters (e.g. MGR1 612 or MGR2 614) is configured to begin a message with an interrupt and the other is configured to begin a message without an interrupt. This configuration addresses the collision issue described above, because the transmitter that starts a message without the interrupt will turn off the pulses approximately 500 nS, for example, and will enter a recessive phase where no pulses are sent as a trailing phase of either the first logic 0 bit or logic 1 bit. At that point, the non-interrupt transmitter will see that the other (interrupt) transmitter is sending pulses and will concede the communication bus to the interrupt transmitter.
The gate driver 600 may include a single-wire data bus 630. The single-wire data bus 630 may be bidirectional, and may operate in GND2 610 plane that connects MGR2 614 to a point-of-use IC which may be placed in, on, or near the FET Drive 632, and which has a logic manager MGR3 616. MGR3 616 and FET Drive 632 may include additional components as shown by MGR3 module 634, and may be an implementation of communication manager 405 and north switches control and diagnostics controller 450N of point-of-use upper phase controller 142 for upper phase switches 144, for example. Gate driver 600 may include switched current sources and sinks (Ia 618, Ib 620, Ic 622, and Id 624) on both sides of the single-wire data bus 630, which may drive the single-wire data bus 630 to a high supply rail (SUP) or to a low supply rail (GND2 610). The gate driver 600 may further include a first comparator CMP2 628 located on a first side of the single-wire data bus 630 and a second comparator CMP3 626 located on a second side of the single-wire data bus 630. CMP2 628 and CMP3 626 may differentiate the high or low state of the single-wire data bus 630, where a low (or high) state is defined as dominant, and the opposing state is defined as recessive.
Further, timer (T) 615 and timer (T) 617 within MGR2 614 and MGR3 616, respectively, may measure the time over which the single-wire data bus 630 is measured as dominant or recessive and where the measured times are used to delineate data bits. Between MGR2 614 and MGR3 616 may be a message encoding scheme for the single-wire data bus 630 where a logic 0 bit is defined as a dominant phase for a first period of time followed by a recessive phase for a second period of time, and a logic 1 bit is defined as a dominant phase for the first period of time followed by a recessive phase for a third period of time that is longer than the second period of time for the recessive phase for the logic 0 bit.
The current sources and sinks (i.e., Ia 618, Ib 620, Ic 622, and Id 624) may provide a current greater than the highest possible EM field-induced coupled current that the single-wire data bus 630 could receive, in order to maintain the driven dominant or recessive state. Ia 618, Ib 620, Ic 622, and Id 624 sizing may be such that the assertion of a dominant state will always overdrive the assertion of a recessive state, such that a transmitter on either side of the single-wire data bus 630 can interrupt the recessive phase of a data bit by pulling the single-wire data bus 630 to a dominant state. For example, an operation of Ia 618 or Ic 622 may overdrive a state of the single-wire data bus 630 over an operation of Ib 620 or Id 624, or an operation of Ib 620 or Id 624 may overdrive a state of the single-wire data bus 630 over an operation of Ia 618 or Ic 622. Further, MGR2 614 and MGR3 616 may include logic rules such that an interrupt on the single-wire data bus 630 causes the interrupted party to yield the single-wire data bus 630 to the interrupter (e.g., the respective MGR).
As shown in
As shown in
Within the communication, a low state (e.g. 802) may indicate a dominant phase implemented by a sender's current sink (either Ib 620 for MGR2 614, or Id 624 for MGR3 616) being active. A high state may indicate a recessive phase implemented by a sender's current source (either Ia 618 for MGR2 614, or Ic 622 for MGR3 616). Similar to the communication of
The message architecture may include fields such as SOF, ID, ADD, R, PAY, CRC, and EOF, for example. SOF may refer to a start of frame field indicating that a new message is starting. The SOF may also be an interrupt phase if the new message is interrupting an existing message. ID may refer to an identification field. The ID field may define which MGR is sent a message. For example, MGR1 612 may be send a message to either MGR2 614 or MGR3 616 utilizing a two bit ID field. Further, MGR2 614 and MGR3 616 may send messages to any other MGR. ADD may refer to an Address field that indicates which register address is being written to or being read from. R may refer to a Read (write) field, and may define if the message is being written to or is requesting a read from the ADD field. PAY may refer to a message payload field, and may be the data to be written to ADD. The PAY field may be equal to zero when the message is a read request. CRC may refer to a cyclic redundancy check field, and may be used by a receiver to check that a message has arrived intact. EOF may refer to an end of frame field, and may indicate that a message has ended. Both the SOF and EOF fields may be formed using different bit architectures of logic 0 or logic 1 by varying the dominant or recessive times.
The gate driver 600 may have a message architecture as illustrated in
MGR1 612 may formulate a message originating from the inverter controller 300 or from internal logic of MGR1 612. MGR1 612 may send the message via galvanic pulses to MGR2 614. MGR2 614 may convert “pulses” to a low state and convert “no pulses” to a high state, or vice versa. These states may then be sent onto the single-wire data bus 630 to MGR3 616. MGR2 614 may also read the message because the message may be intended for MGR2 614 and not for MGR3 616. MGR2 614 may not receive advance information indicating an intended recipient and may send all messages received via galvanic interface 604 to MGR3 616 and read all received messages.
MGR3 616 may similarly send messages via single-wire data bus 630 to MGR2 614. MGR2 614 may send the message via galvanic interface 604 to MGR1 613 and read the message as well. MGR2 614 may convert the single-wire data bus 630 low states into “pulses” and convert single-wire data bus 630 high states into “no pulses”, or vice versa. MGR2 614 has information indicating which direction the message was received (e.g. either from MGR1 613 via galvanic interface 604 or from MGR3 616 via single-wire data bus 630) to prevent MGR2 614 from sending a message back to a message sender. MGR2 614 also has information indicating that MGR2 614 is sending a message, and checks the respective data bus to ensure the data bus is correctly driven without reading the outgoing message on the respective data bus as in incoming message.
The system described herein may solve the problem of communication between a galvanically-isolated plane and a point-of-use IC by using a single-wire data bus 630, which is robust against worst-case induced current. The system described herein may allow the use of a point-of-use IC within a high EM field environment surrounding the FET. Point-of-use ICs may enable point-of-use control and feedback of FET operating conditions and fault response. Point-of-use control and response signals may be faster than control and response signals, which may be heavily filtered to reject coupled current before traveling between the FET and a galvanically isolated controller.
Signals that pass from the point-of-use IC to a remotely located gate driver must be filtered to reject the coupled currents and voltages. As stated above, the gate driver itself sends very high current signals to the FET to switch the FET on and off. These very high currents overdrive coupled currents, and thus, the gate driver can switch the FET on or off in less than approximately 100 nS, for example. However, signals coming from the FET are not driven by low impedance sources with many Amps of current. These signals are typically sensed voltage or currents that are at low levels, and therefore must be heavily filtered to reject high frequency coupled currents. This filtering slows down feedback from the FET to the gate driver and allows dangerous conditions to persist past the point where the gate driver could react to stop them. For example, over-current sensing for all SiC FETs is typically performed by sensing the FET Vdrain to Vsource differential voltage (Vds). The gate driver determines that the sensed Vds is greater than an acceptable threshold after the gate driver has commanded the FET to turn on. The gate driver will shut the FET off when the sensed Vds is too high. The sensed Vds must be filtered for approximately 2 μS to reject coupled currents. However, 2 μS is much too long to allow a SiC FET to remain in an over-current condition, which results in SiC FETs typically being damaged during an over-current event. The system described herein may provide a point-of-use IC that senses an over-current event in much less than 2 μS because the point-of-use IC is co-located with the FET and does not need to filter the data before reacting. The point-of-use IC will autonomously shut the FET off and will then report to the remote controller IC that the shutdown has occurred.
The system described herein may provide a common messaging architecture that works seamlessly across a galvanic interface 604 and a single-wire data bus 630. Messages sent from MGR1 612 across a galvanic interface 604 to MGR2 614 may simultaneously be read by MGR2 614 and passed across a single-wire data bus 630 to MGR3 616. The same data flow can be described for messages sent by MGR3 616 through MGR2 614 to MGR1 612. MGR2 614 can send messages simultaneously to MGR1 612 and MGR3 616. MGR1 612, MGR2 614, or MGR3 616 can interrupt incoming messages to gain control over the galvanic interface 604, the single-wire data bus 630, or both, in order to send a high priority message that may interrupt a low priority message.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
This application claims the benefit of priority to U.S. Provisional Patent Application No. 63/377,486, filed Sep. 28, 2022, U.S. Provisional Patent Application No. 63/377,501, filed Sep. 28, 2022, U.S. Provisional Patent Application No. 63/377,512, filed Sep. 28, 2022, and U.S. Provisional Patent Application No. 63/378,601, filed Oct. 6, 2022, the entireties of which are incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
4054828 | Conzelmann et al. | Oct 1977 | A |
4128801 | Gansert et al. | Dec 1978 | A |
4564771 | Flohrs | Jan 1986 | A |
4618875 | Flohrs | Oct 1986 | A |
4716304 | Fiebig et al. | Dec 1987 | A |
5068703 | Conzelmann et al. | Nov 1991 | A |
5432371 | Denner et al. | Jul 1995 | A |
5559661 | Meinders | Sep 1996 | A |
5654863 | Davies | Aug 1997 | A |
5764007 | Jones | Jun 1998 | A |
5841312 | Mindl et al. | Nov 1998 | A |
5900683 | Rinehart et al. | May 1999 | A |
6028470 | Michel et al. | Feb 2000 | A |
6163138 | Kohl et al. | Dec 2000 | A |
6351173 | Ovens et al. | Feb 2002 | B1 |
6426857 | Doster et al. | Jul 2002 | B1 |
6597556 | Michel et al. | Jul 2003 | B1 |
6812553 | Gerbsch et al. | Nov 2004 | B2 |
6943293 | Jeter et al. | Sep 2005 | B1 |
7095098 | Gerbsch et al. | Aug 2006 | B2 |
7229855 | Murphy | Jun 2007 | B2 |
7295433 | Taylor et al. | Nov 2007 | B2 |
7459954 | Kuehner et al. | Dec 2008 | B2 |
7538425 | Myers et al. | May 2009 | B2 |
7551439 | Peugh et al. | Jun 2009 | B2 |
7616047 | Rees et al. | Nov 2009 | B2 |
7724046 | Wendt et al. | May 2010 | B2 |
7750720 | Dittrich | Jul 2010 | B2 |
8502420 | Mogilevski | Aug 2013 | B1 |
9088159 | Peuser | Jul 2015 | B2 |
9275915 | Heinisch et al. | Mar 2016 | B2 |
9373970 | Feuerstack et al. | Jun 2016 | B2 |
9431932 | Schmidt et al. | Aug 2016 | B2 |
9515584 | Koller et al. | Dec 2016 | B2 |
9548675 | Schoenknecht | Jan 2017 | B2 |
9806607 | Ranmuthu et al. | Oct 2017 | B2 |
9843320 | Richter et al. | Dec 2017 | B2 |
9871444 | Ni et al. | Jan 2018 | B2 |
9882490 | Veeramreddi et al. | Jan 2018 | B2 |
10111285 | Shi et al. | Oct 2018 | B2 |
10116300 | Blasco et al. | Oct 2018 | B2 |
10169278 | Mori et al. | Jan 2019 | B2 |
10232718 | Trunk et al. | Mar 2019 | B2 |
10270354 | Lu et al. | Apr 2019 | B1 |
10291225 | Li et al. | May 2019 | B2 |
10361934 | Elend et al. | Jul 2019 | B2 |
10525847 | Strobel et al. | Jan 2020 | B2 |
10797579 | Hashim et al. | Oct 2020 | B2 |
10924001 | Li et al. | Feb 2021 | B2 |
11082052 | Jang et al. | Aug 2021 | B2 |
11108389 | Li et al. | Aug 2021 | B2 |
11342911 | Lee et al. | May 2022 | B2 |
11838011 | Li et al. | Dec 2023 | B2 |
11843320 | Sivakumar et al. | Dec 2023 | B2 |
11848426 | Zhang et al. | Dec 2023 | B2 |
11851038 | Solanki et al. | Dec 2023 | B2 |
11855522 | Rudolph et al. | Dec 2023 | B2 |
11855630 | Dake et al. | Dec 2023 | B2 |
11870338 | Narayanasamy | Jan 2024 | B1 |
11872997 | Hoos et al. | Jan 2024 | B2 |
11881859 | Gupta et al. | Jan 2024 | B2 |
11888391 | Balasubramanian et al. | Jan 2024 | B2 |
11888393 | Venkateswaran et al. | Jan 2024 | B2 |
11901803 | Ruck et al. | Feb 2024 | B2 |
11901881 | Narayanasamy | Feb 2024 | B1 |
11909319 | Esteghlal et al. | Feb 2024 | B2 |
11916426 | Oner et al. | Feb 2024 | B2 |
11923762 | Sethumadhavan et al. | Mar 2024 | B2 |
11923764 | Zhang | Mar 2024 | B1 |
11923799 | Ojha et al. | Mar 2024 | B2 |
11925119 | Male et al. | Mar 2024 | B2 |
11927624 | Patel et al. | Mar 2024 | B2 |
11938838 | Simonis et al. | Mar 2024 | B2 |
11942927 | Purcarea et al. | Mar 2024 | B2 |
11942934 | Ritter | Mar 2024 | B2 |
11945331 | Blemberg et al. | Apr 2024 | B2 |
11945522 | Matsumura et al. | Apr 2024 | B2 |
11949320 | Jaladanki et al. | Apr 2024 | B2 |
11949333 | Pahkala et al. | Apr 2024 | B2 |
11955896 | Liu et al. | Apr 2024 | B2 |
11955953 | Sinn et al. | Apr 2024 | B2 |
11955964 | Agarwal et al. | Apr 2024 | B2 |
11962234 | Narayanasamy et al. | Apr 2024 | B2 |
11962291 | Oberdieck et al. | Apr 2024 | B2 |
11964587 | Yukawa | Apr 2024 | B2 |
11970076 | Sarfert et al. | Apr 2024 | B2 |
11977404 | Chandrasekaran | May 2024 | B2 |
11984802 | Merkin et al. | May 2024 | B2 |
11984876 | Neidorff et al. | May 2024 | B2 |
11990776 | Dulle | May 2024 | B2 |
11990777 | Woll et al. | May 2024 | B2 |
11996686 | Chan et al. | May 2024 | B2 |
11996699 | Vasconcelos Araujo et al. | May 2024 | B2 |
11996714 | El Markhi et al. | May 2024 | B2 |
11996715 | Nandi et al. | May 2024 | B2 |
11996762 | Hembach et al. | May 2024 | B2 |
11996830 | Murthy et al. | May 2024 | B2 |
11996847 | Kazama et al. | May 2024 | B1 |
12003191 | Chaudhary et al. | Jun 2024 | B2 |
12003229 | Kaya et al. | Jun 2024 | B2 |
12003237 | Waters | Jun 2024 | B2 |
12008847 | Braun et al. | Jun 2024 | B2 |
12009679 | Gottwald et al. | Jun 2024 | B2 |
12012057 | Schneider et al. | Jun 2024 | B2 |
12015342 | Kienzler et al. | Jun 2024 | B2 |
12019112 | Jarmolowitz et al. | Jun 2024 | B2 |
12021517 | S et al. | Jun 2024 | B2 |
20090174353 | Nakamura et al. | Jul 2009 | A1 |
20170331469 | Kilb et al. | Nov 2017 | A1 |
20200195121 | Keskar et al. | Jun 2020 | A1 |
20210005711 | Martinez-Limia et al. | Jan 2021 | A1 |
20220052610 | Plum | Feb 2022 | A1 |
20220294441 | Purcarea et al. | Sep 2022 | A1 |
20230010616 | Gschwantner et al. | Jan 2023 | A1 |
20230061922 | Ritter | Mar 2023 | A1 |
20230082076 | Strache et al. | Mar 2023 | A1 |
20230126070 | Oberdieck et al. | Apr 2023 | A1 |
20230145214 | Walker | May 2023 | A1 |
20230179198 | Winkler | Jun 2023 | A1 |
20230231210 | Joos et al. | Jul 2023 | A1 |
20230231400 | Oberdieck et al. | Jul 2023 | A1 |
20230231496 | Syed et al. | Jul 2023 | A1 |
20230238808 | Swoboda et al. | Jul 2023 | A1 |
20230268826 | Yan et al. | Aug 2023 | A1 |
20230335509 | Poddar | Oct 2023 | A1 |
20230365086 | Schumacher et al. | Nov 2023 | A1 |
20230370062 | Wolf | Nov 2023 | A1 |
20230378022 | Kim et al. | Nov 2023 | A1 |
20230386963 | Kim et al. | Nov 2023 | A1 |
20230402930 | Corry et al. | Dec 2023 | A1 |
20230420968 | Oner et al. | Dec 2023 | A1 |
20230421049 | Neidorff | Dec 2023 | A1 |
20240006869 | Kim et al. | Jan 2024 | A1 |
20240006899 | Wernerus | Jan 2024 | A1 |
20240006993 | Barjati et al. | Jan 2024 | A1 |
20240022187 | Fassnacht | Jan 2024 | A1 |
20240022240 | Balaz | Jan 2024 | A1 |
20240022244 | S et al. | Jan 2024 | A1 |
20240030730 | Wernerus | Jan 2024 | A1 |
20240039062 | Wernerus | Feb 2024 | A1 |
20240039402 | Bafna et al. | Feb 2024 | A1 |
20240039406 | Chen et al. | Feb 2024 | A1 |
20240048048 | Zhang | Feb 2024 | A1 |
20240055488 | Lee et al. | Feb 2024 | A1 |
20240067116 | Qiu | Feb 2024 | A1 |
20240072675 | Formenti et al. | Feb 2024 | A1 |
20240072817 | K et al. | Feb 2024 | A1 |
20240077899 | Chitnis et al. | Mar 2024 | A1 |
20240078204 | Roehrle et al. | Mar 2024 | A1 |
20240079950 | Narayanasamy | Mar 2024 | A1 |
20240079958 | Kumar et al. | Mar 2024 | A1 |
20240080028 | Dake et al. | Mar 2024 | A1 |
20240088647 | Ramadass et al. | Mar 2024 | A1 |
20240088896 | Bilhan et al. | Mar 2024 | A1 |
20240097437 | Goyal et al. | Mar 2024 | A1 |
20240097459 | Swoboda et al. | Mar 2024 | A1 |
20240105276 | Duryea | Mar 2024 | A1 |
20240106248 | Woll et al. | Mar 2024 | A1 |
20240106435 | Zhang et al. | Mar 2024 | A1 |
20240113517 | Sriraj et al. | Apr 2024 | A1 |
20240113611 | Kaufmann et al. | Apr 2024 | A1 |
20240113620 | Ranmuthu et al. | Apr 2024 | A1 |
20240113624 | Southard et al. | Apr 2024 | A1 |
20240120558 | Zhang et al. | Apr 2024 | A1 |
20240120765 | Oner et al. | Apr 2024 | A1 |
20240120962 | Miriyala et al. | Apr 2024 | A1 |
20240128851 | Ruck et al. | Apr 2024 | A1 |
20240128859 | Chen | Apr 2024 | A1 |
20240128867 | Wang et al. | Apr 2024 | A1 |
20240146177 | Mehdi et al. | May 2024 | A1 |
20240146306 | Ramkaj et al. | May 2024 | A1 |
20240149734 | Eisenlauer | May 2024 | A1 |
20240162723 | Zipf et al. | May 2024 | A1 |
20240178756 | El-Markhi et al. | May 2024 | A1 |
20240178824 | Kazama et al. | May 2024 | A1 |
20240186803 | Krieg et al. | Jun 2024 | A1 |
20240198937 | Benqassmi et al. | Jun 2024 | A1 |
20240198938 | Carlos et al. | Jun 2024 | A1 |
20240204540 | Majmunovic et al. | Jun 2024 | A1 |
20240204541 | Majmunovic et al. | Jun 2024 | A1 |
20240204671 | Liu et al. | Jun 2024 | A1 |
20240204765 | Dake | Jun 2024 | A1 |
20240213874 | Junnarkar et al. | Jun 2024 | A1 |
20240213971 | Lee | Jun 2024 | A1 |
20240213975 | Narayanasamy | Jun 2024 | A1 |
20240213981 | Agarwal et al. | Jun 2024 | A1 |
Number | Date | Country |
---|---|---|
3316461 | May 2018 | EP |
2007093598 | Aug 2007 | WO |
2019034505 | Feb 2019 | WO |
2020156820 | Aug 2020 | WO |
2020239797 | Dec 2020 | WO |
2021110405 | Jun 2021 | WO |
2021213728 | Oct 2021 | WO |
2022012943 | Jan 2022 | WO |
2022229149 | Nov 2022 | WO |
2023006491 | Feb 2023 | WO |
2023046607 | Mar 2023 | WO |
2023094053 | Jun 2023 | WO |
2023110991 | Jun 2023 | WO |
2023147907 | Aug 2023 | WO |
2023151850 | Aug 2023 | WO |
2023227278 | Nov 2023 | WO |
2023237248 | Dec 2023 | WO |
2024006181 | Jan 2024 | WO |
2024012743 | Jan 2024 | WO |
2024012744 | Jan 2024 | WO |
2024022219 | Feb 2024 | WO |
2024041776 | Feb 2024 | WO |
2024046614 | Mar 2024 | WO |
2024049730 | Mar 2024 | WO |
2024049884 | Mar 2024 | WO |
2024049909 | Mar 2024 | WO |
2024056388 | Mar 2024 | WO |
2024068065 | Apr 2024 | WO |
2024068076 | Apr 2024 | WO |
2024068113 | Apr 2024 | WO |
2024068115 | Apr 2024 | WO |
2024083391 | Apr 2024 | WO |
2024093384 | May 2024 | WO |
2024104970 | May 2024 | WO |
2024108401 | May 2024 | WO |
2024110106 | May 2024 | WO |
2024110265 | May 2024 | WO |
2024110297 | May 2024 | WO |
2024114978 | Jun 2024 | WO |
2024114979 | Jun 2024 | WO |
2024114980 | Jun 2024 | WO |
2024128286 | Jun 2024 | WO |
2024132249 | Jun 2024 | WO |
Entry |
---|
Balogh, L., “Fundamentals of MOSFET and IGBT Gate Driver Circuits,” Texas Instruments Application Report, SLUA618—Mar. 2017, Retrieved from internet URL: https://ghioni.faculty.polimi.it/pel/readmat/gate-drive.pdf, 65 pages. |
Baranwal, S., “Common-mode transient immunity for isolated gate drivers,” Analog Applications Journal, Texas Instruments (2015), Retrieved from internet URL: https://www.ti.com/lit/an/slyt648/slyt648.pdf?ts=1702052336068&ref_url=https%253A%252F%252Fwww.google.com%252F, 07 pages. |
Boomer, K. and Ahmad H., “Performance Evaluation of an Automotive-Grade, High-Speed Gate Driver for SiC FETs, Type UCC27531, Over a Wide Temperature Range,” NASA Electronic Parts and Packaging Program No. GRC-E-DAA-TN25898 (2015), Retrieved from Internet URL: https://ntrs.nasa.gov/api/citations/20150023034/downloads/20150023034.pdf, 08 pages. |
Ke, X, et al., “A 3-to-40V 10-to-30MHz Automotive-Use GaN Driver with Active BST Balancing and VSW Dual-Edge Dead-Time Modulation Achieving 8.3% Efficiency Improvement and 3.4ns Constant Propagation Delay,” 2016 IEEE International Solid-State Circuits Conference (ISSCC), IEEE, 2016, Retrieved from internet URL: https://picture.iczhiku.com/resource/ieee/WYkrsJrSQPoSjNXm.pdf, 03 pages. |
Sridhar, N., “Impact of an Isolated Gate Driver,” Texas Instruments: Dallas, Texas (2019), Retrieved from Internet URL: https://www.ti.com/lit/wp/slyy140a/slyy140a.pdf, 08 pages. |
Sridhar, N., “Power Electronics in Motor Drives: Where is it?” Texas Instruments (2015), Retrieved from Internet URL: https://www.ti.com/lit/wp/slyy078a/slyy078a.pdf, 09 pages. |
Sridhar, N., “Silicon Carbide Gate Drivers—a Disruptive Technology in Power Electronics,” Texas Instruments, Dallas, Texas (2019), Retrieved from Internet URL: https://www.ti.com/lit/wp/slyy139/slyy139.pdf, 07 pages. |
Maniar, K., et al., “Addressing High-voltage Design Challenges With Reliable and Affordable Isolation Technologies,” 2024, pp. 1-12. Retrieved from internet URL: https://www.ti.com/lit/wp/slyy204c/slyy204c.pdf ts=1710508127616&ref_url=https%253A%252F%252Fwww.google.com%252F. |
“New products,” 5 Pages, Retrieved from internet URL:https://www.ti.com/product-category/new-products.html?%20releasePeriod=364#releasePeriod=90. |
“Qualcomm and Bosch Showcase New Central Vehicle Computer for Digital Cockpit and Driver Assistance Functions at CES 2024,” 2024, 8 Pages. Retrieved from internet URL:https://www.qualcomm.com/news/releases/2024/01/qualcomm-and-bosch-showcase-new-central-vehicle-computer-for-dig. |
“Integrated circuits—EMC evaluation of transceivers—Part 2: LIN transceivers”, International Standard, IEC 62228-2, International Electrotechnical Commission (IEC), 2016 (90 pages). |
“Integrated circuits—EMC evaluation of transceivers—Part 3: CAN transceivers”, International Standard, IEC 62228-3, International Electrotechnical Commission (IEC), 2019 (160 pages). |
LIN Specification Package Revision 2.2A, LIN Consortium, 2010 (194 pages). |
“Road vehicles—Controller area network (CAN)—Part 2: High-speed medium access unit”, ISO 11898-2, International Standard, 2016 (32 pages). |
Number | Date | Country | |
---|---|---|---|
20240106374 A1 | Mar 2024 | US |
Number | Date | Country | |
---|---|---|---|
63378601 | Oct 2022 | US | |
63377512 | Sep 2022 | US | |
63377501 | Sep 2022 | US | |
63377486 | Sep 2022 | US |