Qi Wireless Charging

Qi is a wireless charging technology used to wirelessly power electronic devices such as smartphones, tablets and wearable computing products. Qi, which is pronounced like “chee” and is taken from the Chinese word for “natural energy,” was created by the Wireless Power Consortium in 2009.

The consortium itself formed in 2008 as electronics and mobile device manufacturers like Sony, Samsung, LG, Motorola and HTC partnered to create a standard that would utilize electromagnetic induction principles to power devices without the need for wires.

Qi’s Competition in the Wireless Charging Market

The Wireless Power Consortium’s resulting Qi standard has emerged as the frontrunner in the battle for wireless charging market share against competing technologies such as the Power Matters Alliance’s PowerMat and the Alliance for Wireless Power’s (A4WP) Rezence.

The Power Matters Alliance and the A4WP have since allied as of February 2014 in an agreement to share their specifications in an effort to better compete against the Qi standard.

How Qi Wireless Charging Works

The Qi wireless charging standard enables inductive electrical power transfer over a maximum distance of up to 1.6 inches. A Qi Receiver, which is a mobile device compatible with the Qi standard, is placed on a Qi Sender charging station, which transmits power to the receiving device.

Mobile smartphones and tablets in a Qi wireless system are charged via resonant inductive coupling, or loosely coupled charging, in which multiple devices can be charged at once without the need to place the device(s) in a specific spot and position. This is in contrast to tightly coupled charging, wherein a device needs to be precisely positioned on a wireless charging pad before it can be charged.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...