18460585. METHOD simplified abstract (TOYOTA JIDOSHA KABUSHIKI KAISHA)

From WikiPatents
Jump to navigation Jump to search

METHOD

Organization Name

TOYOTA JIDOSHA KABUSHIKI KAISHA

Inventor(s)

Yu Nagata of Chofu-shi (JP)

Toshihiro Nakamura of Suntoh-gun (JP)

METHOD - A simplified explanation of the abstract

This abstract first appeared for US patent application 18460585 titled 'METHOD

Simplified Explanation

The method described in the abstract involves determining a charging plan for vehicles based on their predicted remaining state of charge (SOC) and predicted consumed SOC.

  • Acquiring vehicle information for a plurality of vehicles, including predicted remaining SOC and predicted consumed SOC.
  • Determining if each vehicle is eligible for charging in a target time period.
  • Creating a charging plan for vehicles that are eligible for charging in the target time period.

Potential Applications

This technology could be applied in electric vehicle charging management systems to optimize charging schedules based on vehicle information.

Problems Solved

1. Efficiently managing the charging of multiple electric vehicles. 2. Ensuring that vehicles are charged optimally based on their predicted SOC.

Benefits

1. Maximizing the use of charging infrastructure. 2. Minimizing charging costs for electric vehicle owners. 3. Optimizing the charging process for electric vehicles.

Potential Commercial Applications

Optimizing Electric Vehicle Charging Schedules for Cost Efficiency

Unanswered Questions

How does this technology handle unexpected changes in vehicle usage patterns?

The method described in the abstract focuses on predicted SOC and consumed SOC, but it does not address how the charging plan would adapt to unexpected changes in vehicle usage patterns. One possible solution could involve real-time monitoring of vehicle data to adjust the charging plan accordingly.

What security measures are in place to protect the vehicle information acquired for charging purposes?

While the abstract mentions acquiring vehicle information, it does not specify the security measures in place to protect this data. Implementing encryption protocols and access controls could help safeguard the sensitive information used in the charging process.


Original Abstract Submitted

A method performed by an information processing apparatus, the method includes, for each of a plurality of vehicles for which charging in a target time period has been applied for, acquiring vehicle information including predicted remaining SOC to be remaining at a start of the target time period and/or predicted consumed SOC to be consumed in a vehicle use period after an end of the target time period, determining, based on the vehicle information, whether each of the plurality of vehicles is a target for charging in the target time period, and determining a charging plan to charge a vehicle being determined to be eligible for charging, among the plurality of vehicles, in the target time period.