The Qi 1.3 and 2.0 specifications make it necessary to include public key certificates in EPP and MPP chargers. These certificates, called “Product Unit Certificates” are specified in the “Authentication Protocol” books respectively (WPC Members Only)
A "Product Unit Certificate" must be embedded in wireless Qi/Ki chargers to enable them to authenticate with power receivers.
Manufacturers who wish to obtain Product Unit Certificates will need to:
The following companies may provide Product Unit Certificates to manufacturers of wireless chargers that have signed the Authentication Agreement for a Manufacturer.
Manufacturer CA Service Providers | Qi | Ki |
---|---|---|
Infineon Technologies AG | x | |
Microchip Technology, Inc. | x | x |
NXP B.V. | x | x |
STMicroelectronics International N.V. | x | x |
Toppan Digital Inc. | x | |
Ubivelox | x | |
Shanghai Fudan Microelectronics Group Co. Ltd. | x | x |
Tongxin Microelectronics Co., Ltd | x | |
CEC Huada Electronic Design Co., Ltd. | x | |
Beijing Watch HuiTong Technology Co., Ltd. | x | |
Tianjin C*Core Technology Co., Ltd. | x | x |
The Manufacturer CA Service Provider User Guide explains the procedure and rules for
See also: PKI Infrastructure for Authentication (WPC members only)
Manufacturer CA Service Providers must use the MCSP Portal to request a certificate from the Root CA Service Provider.
The Root CA signing events take place via the MCSP portal. Certificate Signing Requests (CSRs) are submitted and the Root CA does signing on a weekly basis. Please allow up to 5 business days to have your CSR processed.
Manufacturer CA Service Providers can obtain certificates for testing purpose from the WPC (please contact the Authentication License Administrator). Product Unit Certificates created with such a certificate for testing purposes must not be used in products.
-----BEGIN CERTIFICATE-----
MIIBLDCB06ADAgECAgh3YRK0EUearDAKBggqhkjOPQQDAjARMQ8wDQYDVQQDDAZX
UENDQTEwIBcNMjEwMzAzMTYwNDAxWhgPOTk5OTEyMzEyMzU5NTlaMBExDzANBgNV
BAMMBldQQ0NBMTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABASEByCzo7F50Gx3
raAARNLPIJvDPONEmgjGf4/1A3NjoEP1kHGQr7e88fymZ8tew+oZ+Wp7QR89jWMw
SC1+KBKjEzARMA8GA1UdEwEB/wQFMAMBAf8wCgYIKoZIzj0EAwIDSAAwRQIgacC3
FeLAavaI+bZHo49TZ9UCpvXeVbkFoQJavUJx9GgCIQCfX08/diCuF3TYBLxxmqGb
UFW7ou1N5kD9VPo5W+1duA==
-----END CERTIFICATE-----
Qi Root Certificate Hash
SHA256: A1759ECCA0BE3B850118183ED6CDD6D4A5DB7D83E6FD0E6F475CE4BB6EA01424
SHA1: 99533998A598858DC9EF4A69CD928895705E5F20
-----BEGIN CERTIFICATE---
MIIBLTCB06ADAgECAgg2OI/Yb16ugzAKBggqhkjOPQQDAjARMQ8wDQYDVQQDDAZX
UENDQTIwIBcNMjQwNzE2MDk0NDU2WhgPOTk5OTEyMzEyMzU5NTlaMBExDzANBgNV
BAMMBldQQ0NBMjBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABBIJum05wVScp
382Kgv7msqhLs+UyoXOGxslHhOlLcJF9wttcqj5aL3zAN6cW/PFPiJAAAo0K/FNsrx/
wnTc30GjEzARMA8GA1UdEwEB/wQFMAMBAf8wCgYIKoZIzj0EAwIDSQAwRgIhAJVW
/b+ZgC21osi6vNHDr1tJcEqMoRYPGjlnWRrviT9PAiEAhhueLZP6mQ5XAOPbIUZz
DIFthAWUXv2258Xqj6Vy1eQ=
-----END CERTIFICATE-----
Ki Root Certificate Hash
SHA256: 36316381DC57F64BD741DFEE24A995E8F0B4DA081B47B24007461595AF3F4438
SHA1: FE289B4AEF08F7AFDBC6380AB45058A91BAC85FC
The WPC may revoke any certificate that is signed by the Root CA or by Manufacturer CAs.
The WPC may revoke any certificate that is signed by the Root CA or by a Manufacturer CA, following the rules and procedure described in Annex B of the authentication agreements. Reference copies of all agreements can be found on the page "governing documents".
The latest version of CRL: wpccrl_CRL0005_-_signed.xml
The CRL is an XML file. The schema of the XML is specified in CRL_schema.xsd
The CRL is valid only when signed by the Root CA. The CRL will also be signed by one of two representatives of the WPC, as proof that the CRL was reviewed by the WPC.
The latest version of the CRL is published on this page. It replaces all previously signed CRLs.Always use the latest version.
Each revocation references a "reason" and "decision". The decision is a number can be used to lookup the documentation of the decision to revoke that certificate in the revocation administration.
The "procedureID" in the administration is the same as the "decision" in the CRL. See also the CRL revocation reasons and process steps.pdf.
The WPC Root CA CPS describes the practices and procedures used to address all the requirements identified for the WPC Root CA Certificate Policy. This document combines both the CP and the CPS and it forms the Certificate Policy and the Certificate Practice Statement (CPS) for the Wireless Power Consortium Root CA.
Subscribers and relying parties can consult this redacted version of the CP/CPS to obtain details of the requirements addressed by its CP and how the CP is implemented by the WPC Root CA.
This document follows the framework for CP and CPS described in ETSI EN 319 411-1 and RFC 3647.
For questions and requests, please use the contact the Authentication License Administrator at ala@wirelesspowerconsortium.com.
By joining the WPC you will become a key player in shaping and advancing wireless power standards. WPC members gain invaluable insights to compete more successfully and lead the charge in introducing cutting-edge wireless power transfer products to the market.
To be certain that a product has been tested to Qi certification standards, search for it in our database.