of
0
125
0
Table of Contents INTRODUCTION 3 OVERVIEW 5 CONCEPTS 9 ABSTRACT 11 BLOCK CHAIN SMART CONTRACT 11 VOICE COIN UTILITY TOKEN 12 BLOCK CHAIN TECHNOLOGY AND WIRELESS CHARGING 12 B RIEF DESCRIP TION OF NETWOR K DRAWINGS 13 BLOCK CHAIN BASED WIRELESS POWER MESH NETWORK 14 M ULTI C HANNEL R ECEIVER H ARVESTER D ESIGN 15 B LOCK C HAIN R ECEIVER N ODE R EGISTRATION 19 P OWER T RANSMITTER N ODE V ALIDATION U SING A B LOCK C HAIN 22 P OWER T RANSMITTER D EVICE N ODE U SIN G B OCK C HAIN FOR A UTHENTICATION 27 P OWER T RANSMITTER D EVICE N ODE AND R ECEIVER N ODE U SIN G A B OCK C HAIN TO A UTHENTICATE 29 M ORE I NCLUSIVE S IMPLIFIED M EANS OF W IRELESS C HARGIN G U SIN G B LOCK C HAIN 31 REVENUE MODEL 34 CALCULATION PROCEDURES PERFORMED 34 PRODUCT CHARACTERISTICS 36 COMPETITION 36 KEY ASSUMPTIONS 37 APPENDIX A VOICE LIFE INC REPRESENTATIONS 40 APPENDIX B LIMITING CONDITIONS 40 APPENDIX C DISCOUNTED CASH FLOW MODEL 42 INTELLECTUAL PROPERTY 43 TECHNOLOGY PARTNERS 44 S TRATEGIC P ARTNERSHIP W ITH NV IDIA 44 S TRATEGIC P ARTNERSHIP W ITH M ICROSOFT A ZURE 45 OUR HISTORY 46 ROAD MAP 47 TOKEN SALE OVERVIEW 48 S ALE P ROCESS P RICING 49 L OCK U P M ECHANICS 50 U SE OF F UND S D ETA ILS 50 S OCIAL M EDIAL C OMMUNITY S UPPOR T 51 J URISDICTION G OVERNANCE 51 I NITIAL T OKEN O FFERING C YBER S ECURITY I NDEPENDENT A UDITING 52 THE LEADERSHIP TEAM 53 E X ECU TIVE M A N A GEM EN T T EA M 53 ADVISORS 54 CLOSING REMARKS 55 T HANK Y OU 55 LEGAL CONSIDERATIONS RISKS AND DISCLAIMER 56 REFERENCES 57
INTRODUCTION The white paper disclosure relates to the field of block chain technology with wireless charging in particular a block chain power over Wi Fi method and system that delivers power to IOT low power sensors and mobile devices This white paper shows that a ubiquitous part of block chain technology and wireless infrastructure the Wi Fi router can provide far field wireless power without significantly compromising network performance There is an increasing interest in block chain technology and the Internet of Things where small computing sensors and mobile devices are embedded in everyday objects and environments A key issue is how to power these devices as they become smaller and more numerous plugging them in to provide power is inconvenient and is difficult at large scale The trend of decentralization represents a massive wave of innovation that is reshaping society Decentralized application platforms Smart Contracts are self executing and self enforceable transactions and do not require information to pass through a single point Instead many points connect known as a peer to peer P2P network Smart contracts remove the need for a trusted third party by providing a transparent auditable enforceable and affordable means to conduct a variety of transactions over the Block Chain Cryptographically bound peer to peer networks are going to be one of the defining technologies of our lifetimes They enable fundamentally new forms of social organization 1 The opportunity cost of the legacy financial system is the stifling of innovation Block chain technology will reshape the global financial system in a profound way The decentralization of our institutions will pave the way for innovation that will unlock untold amounts of value It is an evolution a paradigm shift that reflects a big change in our collective consciousness Although individuals and organizations worldwide are beginning to understand what the Block Chain is it is by no means ever present in our daily lives and businesses struggle to implement it into their operations 2 Like any new technology Block Chain and crypto currencies must endure a process of growing pains along the path to widespread adoption The present lack of usability and trust correlate with the immaturity of this emergent technology The Internet for example only became valuable once organizations such as AOL Amazon Google Facebook built successful web apps to give people the ability to benefit from the underlying technology 3 Then when Apple launched its App Store developers and consumers lives alike gained tremendous value and app use exploded It was these sorts of companies that made the Internet accessible and useful to the mainstream We are of the view that the same thing will happen and is already happening for the Block Chain industry https multicoin capital 2017 10 06 blockchains new social order https hbr org 2017 01 the truth about blockchain 3 http press princeton edu chapters s10574 pdf 1 2 3
Currently new kinds of Block Chain transactions and decentralized applications are emerging along with new social norms and expectations Crypto currencies and smart contracts together act as the backbone to this new world On the one hand we are seeing the evolution of money where the process of creating transacting and storing value has fundamentally changed with the invention of cryptocurrencies On the other hand we have Smart Contracts that introduce an added layer of facilitation where agreements can be structured on the Block Chain to be both self executing and self enforcing providing a wide range of benefits and applications By accelerating the transition from batteries to wireless power and permissioned to permission less financial systems we aim to accelerate humanity s ability to achieve its full potential 4
OVERVIEW In the late 19th century Nikola Tesla dreamed of eliminating wires for both power and communication 4 As of the early 21st century wireless communication is extremely well established billions of people rely on it every day Wireless power however has not been as successful In recent years near field short range schemes have gained traction for certain range limited applications like powering implanted medical devices 5 and recharging cars 6 and phones from power delivery mats 7 8 9 We have recently demonstrated the feasibility of powering sensors and devices in the far field using RF signals from TV and cellular10 11base stations This is exciting because in addition to enabling power delivery at farther distances RF signals can simultaneously charge multiple sensors and devices due to their broadcast nature N Tesla My Inventions The Autobiography of Nikola Tesla Hart Bros 1982 B Waters A Sample P Bonde and J Smith Powering a ventricular assist device vad with the free range resonant electrical energy delivery free d system Proceedings of the IEEE 2012 6 G Covic and J Boys Inductive power transfer Proceedings of the IEEE 2013 7 W P Consortium Qi wireless power specification 8 J Jadidian and D Katabi Magnetic mimo How to charge your phone in your pocket MOBICOM 2014 9 Z N Low R Chinga R Tseng and J Lin Design and test of a high power high efficiency loosely coupled planar wireless power transfer system Industrial Electronics IEEE Transactions on 2009 10 A N Parks A P Sample Y Zhao and J R Smith A wireless sensing platform utilizing ambient rf energy In IEEE BioWireless 2013 11 H Visser A Reniers and J Theeuwes Ambient rf energy scavenging Gsm and wlan 4 5 5
Low Power and Lossy Networks LLNs e g sensor networks have a myriad of applications such as Smart Grid and Smart Cities Various challenges are presented with LLNs such as lossy links low bandwidth battery operation low memory and or processing capability of a device etc Changing environmental conditions may also affect device communications For example physical obstructions e g changes in the foliage density of nearby trees the opening and closing of doors etc changes in interference e g from other wireless networks or devices propagation characteristics of the media e g temperature or humidity changes etc and the like also present unique challenges to LLNs For example an LLN may be an Internet of Things IoT network in which things e g uniquely identifiable objects such as sensors and actuators are interconnected over a computer network In IoT and similar networks mobile nodes may register with different local networks as they move For example a person may carry a number of wearable sensors e g heart rate monitor blood glucose meter etc that connect to different networks as the user travels e g through a community between different floors of a building etc Each of these sensors and the various networks may have their own registration and authentication mechanisms that can consume multiple resource cycles depending on how fast the objects are moving Portable electronic devices such as smart phones tablets notebooks and other electronic devices have become an everyday need in the way we communicate and interact with others The frequent use of these devices may significant amount of power which may easily deplete the batteries attached to these devices Therefore a user is frequently needed to plug in the device to a power source and recharge such device This may require having to charge electronic equipment at least once a day or in high demand electronic devices more than once a day Such an activity may be tedious and may represent a burden to users For example a user may be required to carry chargers in case his electronic equipment is lacking power In addition users have to find available power sources to connect to Lastly users must plugin to a wall or other power supplies to be able to charge his or her electronic device However such an activity may render electronic devices inoperable during charging Current solutions to IOT low power sensors and smart phones tablets and other electronic devices this problem may include devices having rechargeable batteries However the aforementioned approach requires a user to carry around extra batteries and also make sure that the extra set of batteries is charged Solar powered battery chargers are also known however solar cells are expensive and a large array of solar cells may be required to charge a battery of any significant capacity Other approaches involve a mat or pad that allows charging of a device without physically connecting a plug of the device to an electrical outlet by using electromagnetic signals 6
For example harvesting RF energy typically utilizes directional antennas to target and deliver energy and utilizes a directional pocket of energy and waveform operating in the 2 4 5 8 GHz radio frequency range In this case the device still requires to be placed in a certain location for a period of time in order to be charged Assuming a single source power transmission of electromagnetic EM signal a factor proportional to 1 r reduces an EM signal power over a distance r in other words it is attenuated proportional to the square of the distance Thus the received power at a large distance from the EM transmitter is a small fraction of the power transmitted To increase the power of the received signal the transmission power would have to be boosted Assuming that the transmitted signal has an efficient reception at three centimeters from the EM transmitter receiving the same signal power over a useful distance of three meters would entail boosting the transmitted power by 10 000 times Such power transmission is wasteful as most of the energy would be transmitted and not received by the intended devices it could be hazardous to living tissue it would most likely interfere with most electronic devices in the immediate vicinity and it may be dissipated as heat In yet another approach such as directional power transmission it would generally require knowing the location of the device to be able to point the signal in the right direction to enhance the power transmission efficiency However even when the device is located efficient transmission is not guaranteed due to reflections and interference of objects in the path or vicinity of the receiving devices addition in many use cases the device is not stationary which is an added difficulty Further current wireless chargers are designed to charge specific electronic devices that are generally co designed with corresponding wireless chargers In other words both the wireless transmitter and a wireless receiver are designed as a pair to be matched in terms of parameters of power transfer Accordingly the wireless transmitter of existing wireless chargers is not capable of supplying power to multiple electronic devices with varying parameters Furthermore the wireless receiver is required to be placed at a specified distance in order to provide efficient and or timely charging In other words any deviation in the distance between the wireless transmitter and the wireless receiver may result in inefficiencies and or insufficient transfer of power Additionally in existing wireless charging networks and systems there is no monitoring of the wireless power transfer process In other words a user is largely unaware of the operational status of the power transfer process The only way that a user may realize that power transfer is taking place is by noticing a change in level of battery of a receiver device Furthermore this requires a user s presence near the wireless charger and or receiver in order to monitor and ensure proper transfer of power 7
Finally in existing wireless charging solutions there is inadequate security and authentication associated with power transfer In particular there are no mechanisms in place to ensure that power transfer is provided only to authorized and authenticated devices Therefore there is a need for improved block chain based authorization and authentication method and system for wirelessly charging of IOT sensor networks and electronic mobile devices that may overcome one or more of the abovementioned problems and or limitations 8
CONCEPTS This summary is provided to introduce a selection of concepts in a simplified form that are further described below reference where in the Detailed Description A computer network is a geographically distributed collection of nodes interconnected by communication links and segments for transporting data between end nodes such as mobile devices personal computers and workstations or other devices such as sensors etc Many types of networks are available ranging from Unstructured or omnidirectional wireless mesh networks Structured wireless mesh networks peer to peer P2P local area networks LANs to wide area networks WANs A unstructured wireless mesh network each mesh node typically uses an omni directional antenna and is able to communicate with all the other mesh nodes that are within the transmission range Structured wireless mesh networks are planned networks typically implemented using multiple radios at each node location and multiple directional antennas Peer to peer P2P computing or networking is a distributed application architecture that partitions tasks or workloads between peers Peers are equally privileged equipotent participants in the application They are said to form a peer topeer network of node LANs typically connect the nodes over dedicated private communications links located in the same general physical location such as a building or campus WANs on the other hand typically connect geographically dispersed nodes over long distance communications links such as common carrier telephone lines optical lightpaths synchronous optical networks SONET synchronous digital hierarchy SDH links and others In addition a Mobile Ad Hoc Network MANET is a kind of wireless ad hoc network which is generally considered a self configuring network of mobile routers and associated hosts connected by wireless links the union of which forms an arbitrary topology Radio frequency RF based wireless technology consists of three different basic system functions namely wireless communication data voice wireless sensing parameter and wireless powering transmission energy The first two well known wireless applications have been found today in nearly all social and economic activities which have been transforming our daily life However the terahertz wireless power transmission WPT which is unknown at least publicly has not yet been developed and established as one of the fundamental driving forces for wireless powering charging of IOT and mobile devices Terahertz wave also known as sub millimeter radiation terahertz radiation tremendously high frequency T rays T waves T light T lux or THz consists of electromagnetic waves within the ITU designated band of frequencies from 0 3 to 3 terahertz THz 1 THz 1012 Hz Block chain based identity and transaction platforms In an example approach identity information e g a photo for a person can be encrypted and stored in a block chain as part of enrolling the person as a user in a block chain based identity and transaction platform Trust relationships can be formed between the user and other users and 9
records of the trust relationships can be stored in the block chain Transactions between the user and other users with whom the user has formed a trust relationship can be authorized Records of the transactions can also be stored in the block chain Authorization can involve for example a multi stage verification process that accesses information stored on the block chain The transactions and identity information along with other information can contribute to an economic identity of the person Storing an economic identity and the underlying information that forms the economic identity of the person in the block chain results in a secure platform accessible to people regardless of their economic or geographic circumstances There are three types of crypto assets stores of value security tokens and utility tokens General purpose stores of value should be valued using the equation of exchange because these currencies are independent monetary bases Examples include Bitcoin Bitcoin Cash Zcash Dash Monero and Decred Although some may disagree I also include the native tokens of smart contract platforms such as Ethereum EOS Dfinity and Kadena in this category Why Because there s a real chance that the native token of a smart contract platform that becomes sufficiently useful will emerge as an independent store of value I do not mention security tokens in this white paper as traditional securities are widely understood Moving securities onto a block chain while better than legacy systems in terms of settlement times and custodianship doesn t change anything about the nature of the security itself The Voice Coin mention in this white will be categorized as a utility tokens 10
ABSTRACT The white paper disclosure relates to the field of block chain technology with wireless charging in particular a block chain power over Wi Fi method and system that delivers power to IOT low power sensors and mobile devices This white paper shows that a ubiquitous part of block chain technology and wireless infrastructure the Wi Fi router can provide far field wireless power without significantly compromising network performance BLOCK CHAIN TECHNOLOGY Block chain is an open source value transfer protocol that runs on a distributed peer to peer network and secures transaction records through cryptography Block chain was first conceptualized through the release of bitcoin a decentralized cryptocurrency that stores and verifies transactions on a distributed ledger known as the block chain designed by a pseudonymous individual or group known as Satoshi Nakamoto Since the emergence of bitcoin many technology and financial institutions have worked to improve upon bitcoin s block chain resulting in the development of public and private block chains which provide different levels of read and write access to network participants Block chain applications are helping financial institutions to improve the efficiency of many back office processes through automatic verification transaction execution and settlement The technology s utility extends far beyond finance with use cases for industries as diverse as supply chain to creative rights management that can be disrupted with secure self executing trustless value transfers BLOCK CHAIN SMART CONTRACT Smart contracts are block chain applications that allow Voice Life developers to define self executing and self enforceable transactions These can be transactions of money or a variety of other forms of data Smart contracts remove the need for a trusted third party by providing a transparent auditable enforceable and affordable means to conduct a variety of transactions over the block chain We will be utilizing smart contracts for all sort of situations but mainly we will be focused on the authentication identify and verification and recurring subscription payment model for providing far field wireless charging We want to be world s only enterprise block chain solution for wireless charging The way in which we executing our plan is described below The Voice Life Smart Contract will start by focusing on Ethereum based smart contracts Over time Voice Life plans to add the ability to support various protocols 11
that also have smart contracts functionality Voice Life is considering protocols such as Waves Coco Komodo Ark etcetera Additionally Voice Life will offer APi s for other applications to integrate with our smart contract ecosystem to further widespread smart contract deployment across a variety of industries and use cases VOICE COIN UTILITY TOKEN The utility token that is created at the Token Sale by the Voice Life Inc is an ERC20 compliant token and is divisible up to 18 decimals Is going to be a digital asset for wireless power We want people to genuinely believe that our token is a store of value where there will be a significant probability that if you are willing to hold onto excess tokens rather than sell them for something else We plan to introduce a profit share or buy and burn mechanism We will be building staking functions into the protocol that lock up the asset We will be implementing a balanced burn and mint mechanics We will be creating a type of gamification to encourage holding If success we will become a store of value Velocity is one of the key levers that will influence long term non speculative value Most utility tokens don t provide a compelling reason for token holders to hold the token for more than a few seconds Absent speculation assets with high velocity will struggle to maintain long term price appreciation Hence our protocol designers are incorporating mechanisms into our protocols that encourage holding not just usage BLOCK CHAIN TECHNOLOGY AND WIRELESS CHARGING The following detailed description refers to the accompanying drawings Wherever possible the same reference numbers are used in the drawings and the following description to refer to the same or similar elements While many embodiments of the disclosure may be described modifications adaptations and other implementations are possible For example substitutions additions or modifications may be made to the elements illustrated in the drawings and the methods described herein may be modified by substituting reordering or adding stages to the disclosed methods Accordingly the following detailed description does not limit the disclosure The present disclosure contains headers It should be understood that these headers are used as references and are not to be construed as limiting upon the subjected matter disclosed under the header The present disclosure includes many aspects and features Moreover while many aspects and features relate to and are described in the context of block chain technology and wireless charging of IOT devices and electronic devices embodiments of the present disclosure are not limited to use only in this context 12
Block chain based methods and systems for wireless power transmissions are provided To make the objectives technical solutions and advantages clear the methods and systems are described in detail with reference to the accompanying drawings BRIEF DESCRIPTION OF NETWORK DRAWINGS The accompanying drawings which are incorporated in and constitute a part of this disclosure illustrate various embodiments of the present disclosure The drawings contain representations of various trademarks and copyrights owned by the Applicants In addition the drawings may contain other marks owned by third parties and are being used for illustrative purposes only All rights to various trademarks and copyrights represented herein except those belonging to their respective owners are vested in and the property of the applicants The applicants retain and reserve all rights in their trademarks and copyrights included herein and grant permissions to reproduce the material only in connection with reproduction of the granted patent and for no other purpose Furthermore the drawings may contain text or captions that may explain certain embodiments of the present disclosure This text is included for illustrative non limiting explanatory purposes of certain embodiments detailed in the present disclosure FIG 1 illustrates an example of a block chain based wireless power mesh network and a multi channel energy harvesting design FIG 2 illustrates examples of block chain receiver node registration with a wireless power network FIG 3 Illustrates examples of a of power transmitter node validation using a block chain FIG 4 Illustrates examples of a of power transmitter device node using bock chain to authenticate identify and verify a unique paring request FIG 5 Illustrates examples of a of power transmitter device node and receiver node using a bock chain to authenticate to detect a unique paring request for power transmission FIG 6 Illustrates examples of a more inclusive simplified means of wireless charging using block chain in a network 13
BLOCK C HAIN BASED W IRELESS P OWER MESH NETWORK According to some embodiments the present disclosure provides an example of a block chain based wireless power transmission network illustrated in FIG 1 FIG 1A is a schematic block diagram of an example of computer network 100 illustratively comprising nodes devices and 200 e g labeled as shown receiver devices 11 45 and server 150 wireless power mesh network WPN all interconnected by various methods of communication For instance the links 105 may be wired links or shared media e g wireless links PLC links etc where certain receiver nodes 200 such as e g drones sensors smart phones notebook computers etc may be in communication with other receiver nodes 200 e g based on distance signal strength current operational status location etc Those skilled in the art will understand that any number of nodes devices links etc may be used in the computer network and that the view shown herein is for simplicity Also those skilled in the art will further understand that while the network is shown in a certain orientation particularly with a power transmitter router node the network 100 is merely an example illustration that is not meant to limit the disclosure 14
Receiver Nodes 200 may communicate with any number of external devices such as wireless power mesh network server s 150 via a network 130 which may be a WAN in some implementations For example a particular node 42 may send sensor data to wireless power server 150 for further processing either via a local network or via a WAN Wireless Power Server s 150 may include but are not limited to wireless power mesh network management system WPNMS devices supervisory control and data acquisition SCADA devices enterprise resource planning ERP servers other network administration devices or the like Data packets 140 e g location and or messages sent between the devices nodes may be exchanged among the nodes devices of the computer network 100 using predefined network communication protocols such as certain known wired protocols wireless protocols e g IEEE Std 802 15 4 WiFi Bluetooth etc PLC protocols or other sharedmedia protocols where appropriate In this context a protocol consists of a set of rules defining how the nodes interact with each other M ULTI C HANNEL R ECEIVER H ARVESTER D ESIGN Wi Fi is ubiquitous in indoor environments and operates in the unlicensed ISM band where transmissions can be legally optimized for power delivery Repurposing Wi Fi networks for power delivery can ease the deployment of RF powered devices without additional power infrastructure Wi Fi uses OFDM an efficient waveform for power delivery because of its high peak toaverage ratio 12 13 Given Wi Fi s economies of scale Wi Fi chipsets provide a cheap platform for sending these power optimized waveforms enabling efficient power delivery Sensors and mobile devices are increasingly equipped with 2 4 and 5 8 GHz antennas for communication via Wi Fi Bluetooth or ZigBee We can in principle use the same antenna for both communication and Wi Fi power harvesting with a negligible footprint on the device size The primary goal of our receiver design is to efficiently harvest power across multiple 2 4 GHz Wi Fi channels Related but equally important is to achieve good sensitivities across these channels Sensitivity is the lowest power at which the receiver can boot up and power the sensors and the microcontroller In theory one can wait for a long time and harvest enough power to boot up the sensors however in practice due to power leakage a harvester cannot operate below a minimum power threshold This is critical because the power available at the sensor decreases with distance from the Wi Fi router thus the harvester s sensitivity determines its maximum operational range M S Trotter and G D Durgin Survey of range improvement of commercial rfid tags with power optimized waveforms In IEEE RFID 2010 13 M S Trotter J D Griffin and G D Durgin Power optimized waveforms for improving the range and reliability of rfid systems In IEEE RFID 2009 12 15
Challenge The key challenge in the design of a Wi Fi receiver harvester is the impedance mismatch between the Wi Fi antenna and the receiver harvester To understand this consider a wave entering a boundary between two different mediums If the impedance of the two mediums differs a fraction of the incident energy is reflected Similarly when the antenna and the harvester have different impedance values a fraction of the RF signal is reflected back reducing the available RF power Resistance value depends on the impedance of the harvester s diodes which is a function of Pin and C We can write the voltage as a function of time as As shown in Fig 1 B typical receiver consists of an antenna followed by a rectifier that converts the 2 4 GHz signal into low voltage DC power This power is fed into a DC DC converter that increases the voltage of the DC signal to match the voltage requirements of the sensor and microcontroller 1 8 2 4 V The problem is that the rectifier hardware is extremely non linear with input power operational frequency and the parameters of the DC DC converter making it challenging to achieve good receiver sensitivity and efficiency across the 72 MHz band that spans the three Wi Fi channels Our Approach As shown in Fig 1B we design a matching network to transform the rectifier s impedance to match that of the antenna This is however not straightforward because the rectifier s impedance varies significantly with frequency power and is dependent on the DC DC converter Our approach is to co design all the components in the receiver harvester the matching network rectifier and DC DC converter Our intuition is that the input of the DC DC converter affects the input impedance of the rectifier Thus if we can co design the rectifier with the DC DC converter we can relax the constraints on the matching network and simultaneously achieve good impedance matching across the 72 MHz Wi Fi band and high voltage at the output of the rectifier Design Details The rest of the section describes each of the components rectifier DC DC converter and matching network in detail Figure IB Receiver harvester schematic Voice Life Inc co designs the matching network rectifier and DC DC converter to achieve good impedance matching across Wi Fi bands The figure shows the optimized DC DC converters for both battery free and batteryrecharging versions of our receiver 1 Receiver Rectifier Design The key design consideration for receiver rectifier is that DC DC converters cannot operate below a minimum input voltage Thus the receiver must be 16
designed to maximize its output voltage Fig 1B shows the various components used in our receiver design At a high level our receiver tracks twice the envelope of the incoming signal and converts it into power Specifically it adds the positive and negative cycles of the incoming sinusoidal carrier signal to double the amplitude To do this it uses a specific configuration of diodes and capacitors as shown in Fig 1B However the output voltage of the receiver We use SMS7630 061 diodes by Skyworks 8 in ultra miniature 0201 SMT packages which low losses i e loss threshold voltage low junction capacitance and minimal package parasitic We also use high quality factor low loss UHF rated 10 pF capacitors that minimize losses and maximize the rectifier s efficiency and sensitivity 2 DC DC converter design In our design a DC DC converter serves two purposes i boost the voltage output of the rectifier to the levels required by the microcontroller and sensors and ii make the input impedance of the rectifier less variable across the three Wi Fi channels The key challenge is the cold start problem in a battery free design all the hardware components must boot up from 0 V Practical DC DC converters however have a nonzero minimum voltage threshold We use the SZ882 DC DC converter from Seiko 14 which is the best in its class it can start from input voltages as low as 300 mV which our receiver can provide and boost the output on a storage capacitor to 2 4V Once the 2 4 V threshold is reached the Seiko charge pump connects the storage capacitor to the output powering the microcontroller and sensors FIGURE 1B A DC DC converter can be further optimized while recharging a battery Specifically the battery can provide a minimum voltage level and hence the hardware components need not boot up from 0 V We use the TI bq25570 energy harvesting chip 15 that contains a boost converter a battery charger voltage monitoring solutions and a buck converter 14 15 S 882Z Series by SEIKO http www eet china com bq25570 by Texas Instruments http www ti com lit ds symlink bq25570 pdf 17
We connect the rechargeable battery to the battery charging node Vbat of the bq25570 We use the boost as our DC DC converter to achieve the voltage required to charge the battery Finally we leverage the maximum power point tracking MPPT mode of the TI chip to tune the input impedance of the DC DC converter so as to minimize the variation of the rectifier s impedance across Wi Fi channels Specifically we set the buck converter s MPPT reference voltage to 200 mV 3 Matching Network Design With our rectifier and DC DC converter designs we have relaxed the constraints on the impedance matching network The resulting circuit can match impedances between the rectifier and a 50 antenna across Wi Fi channels using a single stage LC matching network In LC matching networks inductors are the primary source of losses To mitigate this we use high frequency inductors in 0402 parasitic and a quality factor of 100 at 2 45 GHz The resulting matching network consumes less board area than traditional transmission lines and distributed element based matching networks and can be modified to meet different system parameters without any loss We use 6 8 nH and 1 5 pF as the LC matching network for our battery free harvester and 6 8 nH and 1 3 pF for our battery recharging harvester 16 While this is a first step towards using Wi Fi chipsets for power delivery we believe that with subsequent iterations of the terahertz receiver energy harvester design utilizing block chain technology we will be able to significantly increase the capabilities of our system 16 0402HP Series Inductors by Coilcraft http www coilcraft com pdfs 0402hp pdf 18
BLOCK C HAIN RECEIVER NODE R EGISTRATION Referring now to FIGS 2A 2C examples are shown of a receiver node registering with a network according to various embodiments As shown in FIG 2A a network may include any number of power transmitter devices such as devices 1 2 In some embodiments devices 1 2 may be routers e g terahertz power transmitter router etc located on the edges of local networks that comprise various IoT nodes For example nodes A B may be registered with transmitter device 1 forming a first local network and nodes C E may be registered with transmitter device 2 forming a second local network Also as shown transmitter devices 1 2 may be in communication with any number of block chain server 150a via WAN 130 In some embodiments block chain server 150a may be configured to communicate in a peer to peer manner and to share block chain information with one another Generally the block chain will comprise information about the various nodes that may join the network such as via registration with edge devices 1 2 As shown in FIG 2A assume that a new node F attempts to register with the local network associated with power transmitter router device 1 In such a case node F may send a registration request 202 that includes identification information for node F and or any other metadata regarding node F towards edge device 1 For example in various embodiments registration request 202 may include any or all of the following 19
In FIG 2B power transmitter router device 1 may process registration request from 302 node F and register the transaction with the block chain by sending a notification 304 to block chain server 150a In various embodiments power transmitter router device 1 may already be registered and present in the block chain e g as updated via a registrar with a high trust level e g based on the transaction Power transmitter router device 1 may include any or all of the node information from registration request 302 in notification 304 Further power transmitter router device 1 may also include any other information regarding node F obtained from the local net work or independently by power transmitter router device 1 In some embodiments notification 304 may also include one or more digital signatures for purposes of ensuring that edge device 1 actually sent notification 304 ensuring that the information was originally provided by node F etc Based on notification 304 any number of network devices e g block chain server 150a other devices etc may validate the information regarding node F For example as shown in FIG 3C a block chain server 150a or another device in communication therewith e g an power transmitter router device etc may act as a validator for the information included in notification 304 Preferably a local validator is used by the device seeking validation e g power transmitter router device 1 node A etc to restrict public key distribution but a standalone validator may be used in further implementations To process notification 304 the validator may use the public key s associated with any digital signatures in notification 304 thereby ensuring that notification 304 was sent by the trusted power transmitter router device 1 Then in turn the validator may compare the information regarding node F to the block chain to ensure its validity in view of what is already known about node F in the block chain 20
Finally as shown in FIG 2C a block chain server 150a may update the block chain to add the details regarding node F to the block chain e g that node F registered with the local network associated with edge device 1 etc based on this validation Since the updated block chain is distributed among block chain servers 150a etc the other nodes devices in the network also have access to the information about node F In various embodiments this distribution of the block chain allows the other nodes devices to verify the identity of node F e g when node F migrates to another local network when node F sends a request to another node etc to detect anomalies e g by comparing profile information or other behavioral information regarding node F stored in the block chain to an observed behavior of node F and to perform other functions using the shared information about node F 21
P OWER T RANSMITTER NODE V ALIDATION USING A BLOCK C HAIN FIGS 3A 3E illustrate more detailed examples of receiver node validation using a block chain according to various embodiments As shown in FIG 3A assume that a server 150b is associated with the manufacturer of node F and that server 150b has a high level of trust in the block chain In some embodiments server 150b may update the block chain e g block chain 402 to record information regarding node F as part of a sales transaction For example server 150b may send a block chain update that records that node F has an ID of 1234 is of node type XYZ and was sold to the ABC domain In some embodiments server 150b may also digitally sign the update using a private key allowing any validators to verify that the update was indeed sent by server 150b using the corresponding public key of server 150b 22
As shown in FIG 3B assume that node F later attempts to register with the local domain of transmitter router device 1 similar to the example illustrated in FIGS 3A 3C In response to the registration request from node F transmitter router 1 may send a notification 404 that includes any information from the registration request and or any additional information regarding node F such as the identity of the local domain of transmitter router 1 Particularly notification 404 may include information regarding the network registration transaction to update the block chain As would be appreciated transmitter router 1 can also use the information from node F to validate against any existing details already available in the block chain such as existing details set by the manufacturer Once the device is registered to the LAN of device 1 device 1 can then update the information accordingly 23
In FIG 3C a validator may compare the information in notification 404 from transmitter router device 1 against the block chain to determine a level of trust for node F Recall for example that server 150b previously updated the block chain to indicate that the manufacturer of node F sold the node to the operator of domain ABC In turn the validator in FIG 4C may compare the reported domain in notification 404 against the existing block chain to determine whether the two domains match If so the validator may update the block chain with the information in notification 404 and set a high trust level for node F in the block chain 24
In FIG 3D consider the case in which notification 404 alternatively identifies the domain of transmitter router 1 as DEF In response as shown in 25
FIG 3E the validator may determine that there is a mismatch between the reported domain and the existing information in the block chain regarding the node In particular based on the block chain the validator may determine that node F is attempting to register with a domain that differs from the domain previously reported by the manufacturer in the block chain In turn the validator may update the block chain with the information about node F but also assign a low level of trust to the node due to the discrepancy In various embodiments devices in the network can leverage the information stored in the block chain regarding the distributed nodes to control and assess their behaviors For example a device may prevent a node with a low level of trust from performing certain functions e g communicating with certain devices etc In one embodiment a device that receives a request from a particular node may use the block chain to authenticate the requesting node Based on the results of the authentication the device may control how the request is processed if at all In further cases the block chain may carry behavioral information regarding a particular node such as the location profile of the node or other observations regarding the node In some embodiments devices in the network can then use this behavioral information to assess whether the current behavior of the node is anomalous or otherwise unexpected More detailed examples of the use of the block chain are provided below 26
P OWER T RANSMITTER D EVICE NODE USING BOCK C HAIN FOR A UTHENTICATION FIGS 4A 4B illustrate examples of a device using a block chain to authenticate a request according to various embodiments In FIG 4A assume that node F has registered with the local network associated with edge device 1 While registered in the local network node F may send a request or other message e g reporting sensor data etc to another node either in the same network or in a remote network For example as shown assume that node F sends a request 502 to node E in the remote network associated with edge device 2 In various embodiments as part of sending request 502 node F may also send or otherwise publish its public key For example remote node E may challenge node F for its public key which node F can send via a corresponding application program interface API based response 27
As shown in FIG 4B node E may use the public key from node F to decipher the information in the block chain regarding node F Said differently node E may validate and confirm the identity of node F by using the public key to decipher the digitally signed data regarding node F in block chain 504 If node E is unable to do so node E may take any number of remediation measures such as dropping request 502 sending a security alert to a supervisory device etc Conversely if node Eis able to authenticate the identity of node F it may authorize the data session with node F In some embodiments node E may further assess the trust level of node F in the block chain and apply a lower weightage to any data from node F 28
P OWER T RANSMITTER D EVICE NODE AND RECEIVER NODE USING A BOCK C HAIN TO A UTHENTICATE FIGS 5A 5B illustrate examples of a device using a block chain for authentication identification and verification according to various embodiments As shown in FIG 5A assume that node F is registered to the local network of transmitter router device 1 In some embodiments transmitter router device 1 or another device in the local network may occasionally update the block chain to indicate the observed behavior of node F For example power transmitter router node 1 may monitor the location profile of node F e g when node F sends data the size of the sent data the destination of the sent data etc In turn power transmitter router node 1 may initiate a block chain update 602 that includes the observed location profile of node F 29
In FIG 5B assume that node F later migrates to another local network For example if node F is a mobile or wearable device node F may move away from the local network of edge device 1 and into proximity of the local network of edge device 2 In such a case node F may attempt to register with the local network of edge device 2 As part of this migration the affected devices may use the block chain to ensure that the node attempting to register with the local domain is indeed node F previously in the local domain of edge device 1 e g by deciphering the digitally signed information in the block chain using the public key of node F etc In various embodiments transmitter router device 2 may use any behavioral information in the block chain regarding node F to determine whether an anomalous condition exists For example after node F is registered to the local network of transmitter router device 2 edge device 2 may observe the location profile of node F In tum transmitter router device 2 may compare the observed location profile to that previously recorded in the block chain by transmitter router device 1 If there is a discrepancy in the location profiles transmitter router device 2 may determine that an anomaly exists and take any number of remediation measures e g blocking location sending alerts etc For example assume that node F is a sensor that sends sensor data every hour to a particular service If node F suddenly stops sending the sensor data on time sends it to a different service etc transmitter router device 2 can determine that node F is behaving abnormally and take corrective measures based on the location profile in the block chain 30
MORE I NCLUSIVE S IMPLIFIED MEANS OF W IRELESS C HARGING USING BLOCK C HAIN FIG 6A illustrates an example simplified procedure for using a block chain in a network in accordance with one or more embodiments described herein In some embodiments a specialized computing device e g device 200 may perform procedure 700 by executing stored instructions For example an transmitter router may perform procedure 700 by executing stored instructions The procedure 700 may start at step 705 and continues to step 710 where as described in greater detail above the device may receive a network registration request from a particular node For example a sensor actuator other IoT node etc may attempt to register with a local network of the device In various embodiments the registration request may include information about the particular node such as the type of the node e g type of sensor etc a group identifier a unique node identifier an indication of the network to which the node requests registration or any other information about the particular node In one embodiment the node may also apply a digital signature to the request allowing the device or any other interested device to decipher the contents of the request using the corresponding public key of the node 31
At step 715 as detailed above the device may cause the performance of a validation of the information about the node using a block chain In various embodiments the block chain may include node information regarding the particular node and any number of other nodes For example in some cases the manufacturer of the particular node may create an initial entry in the block chain that includes details about the particular node In turn validation of the node s information may entail comparing the information from the registration request to any existing information about the node in the block chain In some embodiments the device itself may perform the validation In other embodiments the device may cause another validation device to perform the validation such as a block chain server a devoted validation device etc At step 720 the device may cause an update to the block chain based on the validation in step 715 and the information about the node received in step 710 For example if the device is a transmitter router the router may cause the block chain to be updated to reflect that the particular node is attached to the network of the router In some cases a level of trust for the particular node may be included in the update For example if certain information about the node does not match that in the block chain the update to the block chain may indicate a low level of trust for the node At step 725 as detailed above the device may use the updated block chain to control the behavior of the particular node and one or more other nodes Notably since the block chain includes identification information for the particular node and potentially additional metadata regard ing the node e g the node s location profile etc the device can use this information to control how the nodes operate in the network In some cases the device may use the block chain to prevent a node from migrating to its local network In another embodiment the device may limit or restrict traffic flows of the node based on the block chain In a further embodiment the device may use metadata about the node in the block chain to detect anomalous conditions Procedure 700 then ends at step 730 It should be noted that while certain steps within procedure 700 may be optional as described above the steps shown in FIG 6 are merely examples for illustration and certain other steps may be included or excluded as desired Further while a particular order of the steps is shown this ordering is merely illustrative and any suitable arrangement of the steps may be utilized without departing from the scope of the embodiments herein The techniques described herein therefore leverage block chains to update node identity information as well as potentially other metadata about a node In some aspect a power transmitter router node may act as a proxy to update the block chain information on behalf of the node which allows low power devices to conserve resource In another aspect a validator may use the existing information in the block chain about a particular node to validate any new information about the node and update the block chain 32
accordingly Other nodes in the network can also leverage the block chain information to facilitate movement of the node across local networks confirming the identity of the node performing anomaly detection etc While there have been shown and described illustrative embodiments that provide for the use of a block chain to convey device information it is to be understood that various other adaptations and modifications may be made within the spirit and scope of the embodiments herein For example the embodiments have been shown and described herein with relation to certain network configurations How ever the embodiments in their broader sense are not as limited and may in fact be used with other types of shared media networks and or protocols e g wireless In addition while certain functions are depicted as performed by certain devices other embodiments provide for these functions to be distributed as desired across one or more devices The foregoing description has been directed to specific embodiments It will be apparent however that other variations and modifications may be made to the described embodiments with the attainment of some or all of their advantages For instance it is expressly contemplated that the components and or elements described herein can be implemented as software being stored on a tangible non transitory computer readable medium e g disks CDs RAM EEPROM etc having program instructions executing on a computer hardware firmware or a combination thereof Accordingly this description is to be taken only by way of example and not to otherwise limit the scope of the embodiments herein Therefore it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the embodiments herein 33
REVENUE MODEL The Calculation of Revenue and Metrics Projections focused solely on projected cash flows for the one subscription token product that currently is being developed Management intends to use this model solely for the purpose of developing a strategic plan for completion of its S1 Registration IPO on the NASDAQ or the completion of the Crowd Funding Regulation A for a ICO and this information will be used internally and for no other purpose Voice Life Inc has prepared a discounted cash flow model using assumptions provided by management These assumptions are solely the responsibility of the Company This report provides results for calculations made using four different sets of assumptions No other approaches to revenue and metrics projection methods were calculated And we did not consider discounts for lack of marketability and lack of control Revenue projection results range from 956 million to 5 558 Billion CALCULATION PROCEDURES PERFORMED We performed a number of procedures in this Calculation of Revenue and Metrics Projections a list of some of the procedures performed appears below and is followed by a more detailed description of each procedure Additional procedures that were less significant to the results of this Calculation of Revenue and Metrics Projections have been omitted 1 2 3 4 5 6 7 8 Define scope of Calculation of Revenue and Metrics Projections Define method of calculation Obtain initial assumptions Conduct research to support assumptions Discussed assumptions with founder s advisors Build discounted token cash flow model Discuss preliminary results with management Write report DEFINE SCOPE OF CALCULATION OF REVENUE AND METRICS PROJECTIONS The first procedure performed was to define the scope of the calculation Specifically identify what would be valued and the date of Revenue and Metrics Projections After discussion with the cash flows that could be generated by one Voice Coin token product the we plan to produce We plan to begin the pre sales of the Voice Coin digital asset in the first quarter of 2019 34
DEFINE METHOD OF CALCULATION The Company had a set of assumptions that could be used in generating a discounted cash flow model This method makes certain assumptions regarding volume pricing costs taxes and other factors These factors are combined into a mathematical model that predicts cash flows A discounting factor is then determined to adjust for the time value of money Time value of money is a concept that a dollar received in the future is worth less than a dollar received today The future cash flows are discounted to net present value in order to determine a value The Company desired to know the results using different sets of assumptions The Company identified four different sets of assumptions that were each calculated using the same method Those scenarios are titled A B C and D in this report Obtain Initial Assumptions The Company has provided an initial set of assumptions Conduct Research to Support Assumptions The Company has examined these initial assumptions and performed a significant amount of research to better understand the assumptions being made Discuss Assumptions with Management The Founder discussed the assumptions with the Company Advisors In some instances the Company decided to change the assumptions after our discussion As part of this step advisors worked with the Company to help them develop a discount rate I should emphasize that the Company determined the assumptions and that any decisions to change assumptions were made by the Company were not by the advisors Build Discounted Cash Flow Model The company has built the discounted cash flow model using the assumptions provided The model is a multi period model developed in Excel Separate tabs were used for each of the scenarios and the results are combined in a summary tab There is also a separate tab to support the discount rate Discuss Preliminary Results with Founders Advisor Advisors reviewed the preliminary results with management In some instances management made additional modifications to the assumptions Write Report The Company prepared this report which is designed to comply with AICPA and NACYA requirements for Calculation of Revenue and Metrics Projections engagements 35
PRODUCT CHARACTERISTICS The utility token that is created at the Token Sale by the Voice Life Inc is an ERC20 compliant token and is divisible up to 18 decimals Is going to be a digital asset for wireless power It comes into existence through the sale to contributors in exchange for other accepted currencies like ETH BTC and EUR Voice Coins are fully convertible to other listed currencies on External Exchanges VoiceCoin VLC ERC20 Token Total Supply 1 000 000 000 1 Billion Voice Coin VLC Token Monthly Subscription Price 5 99 Pre Sales Start Date January 1 2019 Contract Address 0xBca099a723bd10B7043aE40d89f39F0aCC77983C COMPETITION Wireless charging can be broadly categorized into two types depending upon proximity of distance between transmitter and receiver and range of devices Further these two types can be sub segmented into six sub categories such as radio charging inductive charging and resonance charging are included under proximity of distance between transmitter and receiver and high range mid range and low range are included under range of devices On the basis of application the global wireless charging market is segmented into consumer electronics medical healthcare automobile aerospace defense and industrial automation On the basis of geographical target market it is segmented into North America Latin America Asia Pacific Japan Western Europe Eastern Europe and Middle East Africa Thus the wireless charging market is segmented and complex We are not currently aware of any company or researcher looking to develop an enterprise block chain solution for wireless charging utilizes innovative AI algorithms and deep learning software to focus their directional antennas to target and deliver energy over distance There is a variety of other wireless charging technologies on the market or under development today These competitive technologies fall into the following categories Magnetic Induction Magnetic induction uses a magnetic coil to create resonance which can transmit energy over very short distances Power is delivered as a function of coil size the larger the coil the more power and coils must be directly paired one receiver coil to one transmitter coil directly coupled pair within a typical distance of less than one inch Products utilizing magnetic induction have been available for 10 years in products such as rechargeable electronic toothbrushes Magnetic Resonance Magnetic resonance is similar to magnetic induction as it uses magnetic coils to transmit energy This technology uses coils that range in size depending on the power levels being transmitted It has the ability to transmit power at distances up to 11 inches 30cm which can be increased with the use of resonance repeaters 36
Conductive Conductive charging uses conductive power transfer to eliminate wires between the charger often a charging mat and the charging device It requires the use of a charging board as the power transmitter to deliver the power and a charging device with a built in receiver to receive the power This technology requires direct metal contact between the charging board and the receiver Once the charging board recognizes the receiver the charging begins RF Harvesting Harvesting RF energy is at the core of Voice Life Inc technology RF harvesting approaches typically utilize directional antennas to target and deliver energy To our knowledge there are two other companies attempting to utilize a directional pocket of energy similar to that being developed by Voice Life Inc but nobody developing an enterprise block chain solution for wireless charging Laser Laser charging technology uses very short wavelengths of light to create a collimated beam that maintains its size over distance using what is described as distributed resonance to deliver power to an optical receiver Ultrasound Ultrasound charging technology converts electric energy into acoustic energy in the form of ultrasound waves It then reconverts those waves through an energy harvesting receiver KEY ASSUMPTIONS One Product The Company provided the assumptions used in this Calculation of Revenue and Metrics Projections Most of the assumptions were the same for all four scenarios presented but several of the assumptions were different for each scenario Following is a discussion of some but not all of the assumptions used in the Calculation of Revenue and Metrics Projections Life Span All consumer products experience a life span that includes a period of consumer acceptance If the product is accepted in the market place then a period of rapid growth follows The rapid growth leads to a period of stable demand Finally the product begins to lose demand as other products replace it We are assuming that the product would be introduced to the market during the first quarter of 2019 The product would be readily accepted and achieve maximum market penetration by the beginning of 2020 Peak market penetration would be achieved in 2021 and 2022 Market Size Wireless Charging Market is slated to be valued USD 25 67 billion by 2023 according to a new research report by Global Market Insights Inc Significant smartphone demand has led to growing adoption of these solutions Development in telecommunication technologies coupled with increased number of internet users will be particularly beneficial for Asia Pacific wireless charging market size This trend is further intensified by the burgeoning population base and availability of mobile broadband 37
In 2017 as a whole smartphone sales to end users totaled over 1 5 billion units an increase of 2 7 percent from 2016 see Table 2 Huawei ranked No 3 raised its share in 2017 continuing to gain on Apple At the same time the combined market share of the Chinese vendors in the top five increased by 4 2 percentage points while the market share of top two Samsung and Apple remained unchanged Global sales of smartphones to end users totaled nearly 408 million units in the fourth quarter of 2017 Market Penetration Market penetration represents the percentage of smart phone purchasers that will purchase a token subscription For example 1 means that one subscription will be sold for each one hundred smart phones sold Market penetration is one of the assumptions that vary amongst the four scenarios Scenarios were prepared for market penetrations rates reaching maximums of 1 2 0 3 0 and 4 0 The Company provided these estimates Subscription Price The Company provided the monthly subscription price of 5 99 The Company estimates that the 38
cost of popular smart phone accessories sold separately would total several hundred dollars My own research of products providing similar functionality confirms that they would cost several hundred dollars and they would not provide the functionality and portability of the features available in the two products Yearly Subscription Price The Company provided a yearly subscription price of 49 99 This price was estimated to allow a 10 00 or 20 retail markup for retailers Our research did not provide conclusive evidence regarding retail markups for smartphone accessories The information we were able to find on retail markups was anecdotal and second hand The information was mostly posts to on line discussions about retail markups for electronic products and accessories Generally accessories such as cables and connectors have retail markups of 100 or more while computers and televisions have retailed markups of 10 or less Manufacturing Costs Voice Coin VLC ERC20 Token Total Supply 1 000 000 000 1 Billion Cost 750 00 Voice Coin VLC Token Monthly Subscription Price 5 99 Pre Sales Start Date January 1 2019 Contract Address 0xBca099a723bd10B7043aE40d89f39F0aCC77983C Operating Costs The Company has estimated the cost of operations will be 10 of token subscription revenue These costs include marketing operations administration sales and all other costs not captured elsewhere in the Calculation of Revenue and Metrics Projections Interest The Company assumes the one subscription product will be funded with equity capital only and that this product will generate little or no debt Depreciation The Company assumes the one subscription product will require little or no fixed assets because the Company plans to use a contract manufacturer to produce the product Tax Rate The Company assumes federal and state income taxes will average 40 of taxable income Discount Rate The Company developed the discount rate using the buildup method It includes a risk free rate plus risk premiums for equity size industry and company specific factors The risk free rate represents recent yields on 30 year United States treasury bonds The equity risk premium represents an average difference between yields on stocks and bonds over a period of several decades The size premium represents the additional return expected on companies with smaller market capitalizations compared to the largest publicly traded companies 39
The industry risk premium represents the additional return expected on companies in the electronic equipment manufacturing sector compared to the average for all industries combined The company specific risk premium represents the additional risk premium caused by the reliance on key individuals who have developed the product and the reliance on a single product for success A summary of the factors and the specific rates used can be found in the appendices to this report APPENDIX A VOICE LIFE INC REPRESENTATIONS The calculations and other information included in this report are subject to the specified assumptions and limiting conditions see Appendix B The Calculation of Revenue and Metrics Projections was performed in accordance with the American Institute of Certified Public Accountants Statement on Standards for Valuation Services The parties for which the information and use of this Calculation of Revenue and Metrics Projections report is restricted this report is not intended to be and should not be used by anyone other than such parties as equity investors APPENDIX B LIMITING CONDITIONS The Calculation of Revenue and Metrics Projections arrived at herein is valid only for the stated purpose as of the date of the Revenue and Matrix Projections Report Assumptions affecting cash flows and other related information provided by Voice Life Inc or its representatives in the course of this engagement have been accepted without any verification except as specifically noted herein 1 Voice Life Inc or its representatives have provided public information and industry and statistical information Voice Life Inc makes no representation as to the accuracy or completeness of such information and has performed no procedures to corroborate the information other than the procedures described in this report 2 We do not provide assurance on the achievability of the results forecasted by Voice Life Inc because events and circumstances frequently do not occur as expected differences between actual and expected results may be material and achievement of the forecasted results is dependent on actions plans and assumptions of management 3 The Calculation of Revenue and Metrics Projections arrived herein is based on the assumption that the current level of management expertise and effectiveness would continue to be maintained and that the character and integrity of the enterprise through any sale reorganization exchange or diminution of the owners participation would not be materially or significantly changed 40
4 This report and the Calculation of Revenue and Metrics Projections herein are for the exclusive use of Voice Life for the sole and specific purposes as noted herein Any other party may not use them for any other purpose or for any purpose Furthermore the report and Calculation of Revenue and Metrics Projections are not intended by the author and should not be construed by the reader to be investment advice in any manner whatsoever 5 No change of any item in this Calculation of Revenue and Metrics Projections report shall be made by anyone other than Voice Life Inc and shall have no responsibility for any such unauthorized change 6 Unless otherwise stated no effort has been made to determine the possible effect if any on the subject business due to future Federal state or local legislation including any environmental or ecological matters or interpretations thereof 7 Except as noted Voice Life Inc have relied on the representations of the owners management and other third parties concerning the value and useful condition of all equipment real estate investments used in the business and any other assets or liabilities except as specifically stated to the contrary in this report 41
APPENDIX C DISCOUNTED CASH FLOW MODEL The discounted cash flow model used in this Calculation of Revenue and Metrics Projections is contained on the following pages 42
INTELLECTUAL PROPERTY We are a technology company offering numerous innovative products related to the Voice Coin a digital asset for wireless power We provide tokens of our products and related intellectual property to leverage strategic partnerships We believe our intellectual property portfolio is going to be a valuable asset that can be monetized by providing a token subscription based model We have 2 patents pending which utilizes block chain technology and describes a novel process and energy source for wireless charging A partnership and license with Voice Life Inc include proprietary block chain technology and wireless power transmission design libraries scalable transmitter and receiver reference designs smart contracts software stacks from device firmware to cloud based enterprise management tools high volume technology transfer readiness documentation custom design and applications engineering support as well as patent know how and comprehensive intellectual property coverage We are in the process of filling four more inventions that are novel and patentable 43
TECHNOLOGY PARTNERS S TRATEGIC P ARTNERSHIP WITH NV IDIA In January 2017 we executed a strategic partnership with NVidia Concurrently we are utilizing the NVIDIA technologies that include AI Deep Learning Computer Generated Software algorithms Voice Recognition and use of a GPU Supercomputer NVidia partnership includes proprietary block chain technology and design libraries scalable transmitter and receiver reference designs software stacks from device firmware to cloud based enterprise management tools managed power wireless network high volume technology transfer readiness documentation custom design and applications engineering support as well as patent know how and comprehensive intellectual property coverage and incorporation into NVidia products 44
S TRATEGIC P ARTNERSHIP WITH M ICROSOFT A ZURE As part of our commercialization efforts in January 2017 we executed a strategic partnership with Microsoft We are using Microsoft Azure to support a myriad of applications such as a Smart Grid and Smart Cities The wireless charging solution we are developing employs use of AI and Deep Learning on a GPU accelerated platform Our AI Lab consists Azure N Series that includes 1 GPU Accelerated Server 12 GPUs 18 432 cores Azure NC based instances are powered by NVIDIA Tesla K80 GPUs and provide the compute power required to accelerate the most demanding high performance computing HPC We have setup the following virtual network nodes in the following countries below 45
OUR HISTORY Voice Life Inc was founded March 12 2015 and is a development stage technology Company and a pioneer in block chain technology We present the first power over WI FI system that delivers power to smart phones and other low power sensors IOT devices and works with existing Wi Fi chipsets Specifically we show that a ubiquitous part of wireless communication infrastructure the Wi Fi network router in the cloud in the office and in the home can provide far field wireless power transmission without significantly compromising the network s communication performance 46
ROAD MAP As everyone knows the more you use your phone the faster the battery drains In order to bring new apps like augmented reality to a stadium fans need to be able to use their phone without worrying about running out of power Charging has been a difficult solution in public spaces hindered by everything from incompatible cable connectors to the hassle of finding a plug to the inconvenience of having your device tethered down to broken ports clogged with food and sticky soda With the new option Block Chain Power Over Wi Fi you will be able to wireless charge all of the new and existing in the IPhones and Android phones utilizing your voice with a new more inclusive simplified means of wireless charging 47
TOKEN SALE OVERVIEW This is a Token Generating Event We will issue up to 230 300 000 Voice Coin tokens during all of the rounds If the sale of all rounds is fully successful this will create a max supply of 230 300 000 Voice Coin Tokens 11 of total tokens will be allotted to the Team and Advisors to align our interests with those of the community 14 of the total tokens will be held by the company as a token reserve Utility tokens also called user tokens or app coins represent future access to a company s product or service THE STAGES OF OUR INITITAL COIN OFFERING ICO OR IPO Friends and Family Started March 25 and Ended April 7 2018 The Seed Round Will Start April 9 2018 and ends May 19 2018 The Early Bird Round Will Start on May 21 2018 and End June 30 2018 Pre ICO or Pre IPO will Start on July 9 2018 and Ends September 1 2018 The Initial Coin Offering ICO or Initial Public Offering Exact date TBD Our token offering will fund the growth of block chain technology adoption and smart contract deployment first and foremost We have designed our token allocation to focus on both of these priorities We have designed a robust innovation wireless network hub and bounty pool program to reward developers and users alike for participating in the adoption process A major component is allocated to a marketing pool for a grass roots token giveaway program to help communities around the world bring wireless charging into their daily lives This activity will facilitate the adoption of smart contracts mobile Block Chain applications and crypto s working together Our fund allocation plan below will outline how we will handle funds raised in more detail The minimum contribution will be 0 1 ETH with no maximum contribution 48
Participants in the Seed and Early Bird stages will receive their tokens once the Initial Token Offering has been completed as a means of lock up S ALE P ROCESS P RICING During the token offering of Voice Life Inc we will accept Ethereum or Bitcoin Private sales and pre sale will accept fiat currency Participants in the private sales will be subject to a lock up period where their tokens are delivered when the ICO is completed When a contributor sends ETH or BTC to Voice Coin upon the funds being received in the Voice Coin wallet VOICE LIFE will then take a spot price from CoinMarketCap of the cryptocurrency that was sent to Voice Coin and it will convert the cryptocurrencies value at the spot price in USD and allocate the corresponding amount of Voice Coin tokens to the contributor s wallet Tokens will be delivered to the purchaser upon completion of the Initial Token Offering Any unsold tokens as part of the Pre Sale will be burned Any unsold tokens as part of the Initial Token Offering will return to the company token reserve Tokens will be priced accordingly Round Friends and Family Seed Earl y Bir d Pre ICO or Pr e IPO A major component is allocated to a marketing pool for a grass roots token giveaway program to help communiti es around the w orld bring wireless charging i nto their daily lives IC O Token Price VOICE LIFE Token Confi dential 15 000 000 Private 30 000 000 Private 25 00 0 000 1 50 55 000 000 Free 300 000 30 000 Participants 5 99 Over Subscri pti on Te a m an d Reserve Not issued to participants Mar ch 25 2018 April 7 2018 Pr ivate Sal e April 9 2018 May 19 2018 Pr ivate Sal e May 21 2018 June 30 2018 Private Sake July 9 2019 September 1 2018 Private and Public on Request Publi c Li mi ted to 1 000 Toke ns Per Par ti ci pant Star t Date TBD 100 000 000 Exact Date TBD 5 000 000 All Rounds 25 00 000 230 000 000 255 000 000 49 Availability Total Issued to Partici pants Total Tok ens
LOCK UP MECHANICS Friends and Family No Lock up For the employees of the company the Voice Life Inc tokens will vest as follows 20 on issuance of VOICE LIFE Tokens to employees at the same time that the presale contributors receive their tokens 20 after 3 months 20 after 6 months 20 after 9 months 20 after 12 months Token Issuing Company The Voice Coin token will be issued by Voice Life Inc corporation whose registered office is situated at 7071 Warner Ave 460 Huntington Beach CA The company s director is Robert Smith the CEO President of Voice life Inc Token Sale Official Website Visit Us At www voice life com USE OF F UNDS D ETAILS The Voice Life Inc funding will be allocated across our primary segments of business activity in a time span of 5yrs This is how we will spend the 250 million tokens we are estimating will get funding from the 15 Million ICO Tokens and 185 subscription based tokens sold Assumptions 1 This is assuming the presale to be successful 100 and the sale to provide at least 65 2 Platform required investment as well as coverage of operational expenses would be first to be funded from the ICO potential client s solutions Marketing and other activities will depend directly on the success of the Pre ICO or Pre IPO 50
S OCIAL MEDIAL C OMMUNITY S UPPORT To learn more about VOICE LIFE and engage with our community please join us in any of our following forums Facebook Telegram Please be sure to sign up HERE to get regular updates regarding our token sale JURISDICTION GOVERNANCE Voice Life Inc has hired several independent legal and strategic advisors to ensure that Voice Life Inc has put in place a strong governance policy and has the appropriate legal structure in a robust jurisdiction with respect to international regulation of Voice Life Inc initial coin sale Voice Life Inc has formed a special purpose vehicle SPV to issue the tokens to participants and to collect and hold the participants contributions until they are dispersed to the operating company executing the roadmap and plan The SPV know as the Token Issuance Company will be the holder of the funds raised in The Voice Coin pre sale s and token sale in BTC ETH ERC20 tokens or Fiat Currency The release of funds to the operating company will be made in line with the roadmap and project deliverables and milestones being met Token Sale Know Your Customer KYC And Anti Money Laundering AML Process The KYC AML process will be run by our partners at Blockex for contributions in fiat For contributions in crypto currency the KYC process will be run through the Voice Life Inc contribution platform Depending on the number of participants signing up whether documentation is provided in full and jurisdiction of the participant will affect the amount of time required to verify If a participant is institutional in size the documentation will have to reflect this In addition if a participant is a company Blockex require all company documents including and not limited to certificate of incorporation share schedule in full and all director and UBO information UBO being any person with over 25 interest in a company For a company wishing to participate with large blocks they will be required to provide audited accounts proving source of wealth and funds that reflect the amounts they wish to participate with 51
I NITIAL T OKEN OFFERING C YBER S ECURITY I NDEPENDENT A UDITING To ensure that the Voice Coin token offering will be as seamless as possible Voice Life Inc is having the Voice Coin smart contract audited by independent party prior to the token offering Once the independent auditor has completed their review and once any issues that have been discovered have been adequately addressed Voice Coin will open source the token contract for a public audit with a bug bounty in place for the discovery of any unresolved issues Additionally the Voice Coin Token Sale webpage and all other pages owned by Voice Life Inc or its partner organizations have been fully audited by reputable cyber security professional in order to reduce the risk of cyber attacks such as hacking or phishing Please see Terms and Conditions Funds Storage Participants in The Voice Coin token sale will send their funds to a secure multi signature wallet All token sale funds not being utilized will be held in a secure multi signature wallet address with a multi key structure with 2 key holders The multi signature keys will be held by two of the Voice Life Inc Team The above does not apply to the Seed and Early Bird rounds where only fiat currency is accepted These funds will reside in the company s financial accounts held at a third party financial organization Terms Conditions All token sale participants are required to review understand and agree to our terms and conditions to be eligible to participate in the initial coin offering also known as the token sale 52
THE LEADERSHIP TEAM We are a team of experienced professionals spanning numerous industries Our core expertise includes block chain technology AI voice recognition and wireless charging technology In additional we have expertise in banking and financial software including employees who combined have over 40 years of experience Our team and advisors have built and exited various successful startups held senior positions in top Fortune 100 companies with a collective experience that spans a variety of industries including but not limited to telecom tech retail wholesale mobile eCommerce entertainment marketing services and of course the Block Chain industry E XECUTIVE M ANAGEMENT T EAM 53
ADVISORS 54
CLOSING REMARKS There is increasing interest in the Internet of Things where small computing sensors and mobile devices are embedded in everyday objects and environments A key issue is how to power these devices as they become smaller and more numerous plugging them in to provide power is in convenient and is difficult at large scale We introduce a novel farfield power delivery system using existing Wi Fi chipsets We do so while minimizing the impact on Wi Fi network performance While this is a first step towards using Wi Fi chipsets for power delivery we believe that with subsequent iterations of the receiver design we can significantly increase the capabilities of our system We are deeply committed to the advancement of Block Chain technology adoption worldwide Focusing on real world applications and the social behaviors that make our world turn we know that the result of attaining our goals will redefine life on earth The status quo of power grid money banking trade and commerce needed a reset and this wave of innovation is irreversible The question is how fast and how smooth we can humanity be in our collective transition to this new system of wireless power transmission money value and technological advancement Our vision is big and it cannot be accomplished alone or strictly in house It takes a village to raise a child and a community to realize a dream Thank You Contact Information Robert Smith Founder President CEO Adrress 7071 Warner Ave 460 Huntington Beach CA 92647 888 502 2338 Email Robert voice life com Website http voice life com Professional Profile www linkedin com in robertsmith33 We sincerely appreciate you taking the time to read our whitepaper and explore our vision We welcome your feedback and look forward to connecting with you in our forums Thank you for joining us this far We hope you decide to get more involved with the user community and participate with us to move the entire Block Chain world forward 55
LEGAL CONSIDERATIONS RISKS AND DISCLAIMER IMPORTANT NOTICE PLEASE READ THE ENTIRETY OF THE Legal Considerations Risks and Disclaimer SECTION CAREFULLY WE RECOMMEND YOU CONSULT A LEGAL FINANCIAL TAX OR OTHER PROFESSIONAL ADVISOR S OR EXPERTS FOR FURTHER GUIDANCE PRIOR TO PARTICIPATING IN THE VOICE COIN LIMITED TOKEN SALE OUTLINED IN THIS WHITE PAPER YOU ARE STRONGLY ADVISED TO TAKE INDEPENDENT LEGAL ADVICE IN RESPECT OF THE LEGALITY IN YOUR JURISDICTION OF YOUR PARTICIPATION IN THE TOKEN SALE YOU SHOULD NOTE THAT IN THE TOKEN SALE TERMS AND CONDITIONS at https www voice life com terms php THAT YOU ARE ACKNOWLEDGING AND ACCEPTING AS PART OF THE PROCESS TO PARTICIPATE IN THE VOICE COIN LIMITED TOKEN SALE YOU ARE REPRESENTING THAT YOU HAVE INDEED TAKEN INDEPENDENT LEGAL ADVICE Please note that this is a summary of the legal considerations risks and disclaimers document which can be found https www voice life legal php and which you must read in full i making use of this White Paper and any and all information available on the website s of Voice Life Inc the Company and or ii participating in the Company s token sale outlined in this White Paper the Token Sale Any undefined capitalized terms below shall have the meaning set out in the Legal Considerations Risks and Disclaimer section This summary should not be relied on in place of reading the Legal Considerations Risks and Disclaimer section in full The Legal Considerations Risks and Disclaimer section the full version of which can be found at https www voice life com legal php applies to this White Paper and any and all information available on the Website The contents of the Legal Considerations Risks and Disclaimer section outlines the terms and conditions applicable to you in connection with i your use of this White Paper and of any and all information available on the Website and or ii your participation in the Token Sale in each case in addition to any other terms and conditions that we may publish from time to time relating to this White Paper the Website and the Token Sale such terms hereinafter referred to as the Terms In no event shall the Company or any current or former Company Representatives be liable for the Excluded Liability Matters The Company does not make or purport to make and hereby disclaims any representation warranty or undertaking in any form whatsoever to any entity or person including any representation warranty or undertaking in relation to the truth accuracy and completeness of any of the information set out in the Available Information You should carefully consider and evaluate each of the risk factors and all other information contained in the Terms before deciding to participate in the Token Sale 56
REFERENCES 1 0402HP Series Inductors by Coilcraft http www coilcraft com pdfs 0402hp pdf 2 Alexa Top Sites in United States http www alexa com topsites countries US Loaded January 13 2015 3 bq25570 by Texas Instruments http www ti com lit ds symlink bq25570 pdf 4 Cota by Ossia http www ossiainc com 5 Energous Wattup wireless charging demo http www engadget com 2015 01 05 energous wattup wireless charging demo 6 PhantomJS http phantomjs org Loaded January 14 2015 7 S 882Z Series by SEIKO http www eet china com ARTICLES 2006MAY PDF S882Z_E pdf 8 SMS7630 061 by Skyworks http www skyworksinc com uploads documents SMS7630_061_201295G pdf 9 Wattup by Energous http www energous com overview 10 G Andia Vera A Georgiadis A Collado and S Via Design of a 2 45 ghz re ctenna for electromagnetic em energy scavenging In IEEE RWS 2010 11 W P Consortium Qi wireless power specification 12 G Covic and J Boys Inductive power transfer Proceedings of the IEEE 2013 13 J P Curty N Joehl C Dehollaini and M J Declercq Remotely powered addressable uhf rfid integrated system IEEE Journal of Solid State Circuits 2005 14 J Ensworth S Thomas S Y Shin and M Reynolds Waveform aware ambient rf energy harvesting In IEEE RFID 2014 15 S Gollakota N Ahmed N Zeldovich and D Katabi Secure in band wireless pairing In USENIX Security 2011 16 K Gudan S Shao J J Hull J Ensworth and M S Reynolds Ultra low power 2 4ghz rf energy harvesting and storage system with 25dbm sensitivity In IEEE RFID 2015 17 J A Hagerty F B Helmbrecht W H McCalpin R Zane and Z B Popovic Recycling ambient microwave energy with broad band rectenna arrays IEEE Transactions on Microwave Theory and Techniques 2004 18 A M Hawkes A R Katko and S A Cummer A microwave metamaterial with integrated power harvesting functionality Applied Physics Letters 2013 19 J Jadidian and D Katabi Magnetic mimo How to charge your phone in your pocket MOBICOM 2014 20 Y Kawahara X Bian R Shigeta R Vyas M M Tentzeris and T Asami Power harvesting from microwave oven electromagnetic leakage In UbiComp 2013 21 Y Kawahara H Lee and M M Tentzeris Sensprout Inkjet printed soil moisture and leaf wetness sensor In Ubicomp 2012 22 B Kellogg A Parks S Gollakota J Smith and D Wetherall Internet connectivity for rf powered devices SIGCOMM 2014 23 B Kellogg V Talla and S Gollakota Bringing gesture recognition to all devices In Usenix 57
NSDI 2014 24 A Kurs A Karalis R Moffatt J D Joannopoulos P Fisher and M Soljacic Wireless power transfer via strongly coupled magnetic resonances Science 2006 25 V Liu A Parks V Talla S Gollakota D Wetherall and J R Smith Ambient Backscatter Wireless Communication Out of Thin Air In ACM SIGCOMM 2013 26 Z N Low R Chinga R Tseng and J Lin Design and test of a high power high efficiency loosely coupled planar wireless power transfer system Industrial Electronics IEEE Transactions on 2009 27 S Naderiparizi A Parks Z Kapetanovic B Ransford and J R Smith Wispcam A battery free rfid camera In IEEE RFID 2015 28 U Olgun C C Chen and J Volakis Efficient ambient wifi energy harvesting technology and its applications In IEEE APSURSI 2012 29 U Olgun C C Chen and J Volakis Wireless power harvesting with planar rectennas for 2 45 ghz rfids In URSI 2010 30 U Olgun C C Chen and J Volakis Design of an efficient ambient wifi energy harvesting system IET Microwaves Antennas Propagation 2012 31 A N Parks A P Sample Y Zhao and J R Smith A wireless sensing platform utilizing ambient rf energy In IEEE BioWireless 2013 32 D M Pozar Microwave engineering John Wiley Sons 2009 33 A Sample and J R Smith Experimental results with two wireless power transfer systems In IEEE RWS 2009 34 A Sample D Yeager P Powledge A Mamishev and J Smith Design of an rfid based battery free programmable sensing platform IEEE Transactions on Instrumentation and Measurement 2008 35 V Talla B Kellogg B Ransford S Naderiparizi S Gollakota and J R Smith Powering the next billion devices with wi fi arXiv preprint arXiv 1505 06815 2015 36 V Talla S Pellerano H Xu A Ravi and Y Palaskas Wi fi rf energy harvesting for battery free wearable radio platforms In RFID RFID 2015 IEEE International Conference on pages 47 54 IEEE 2015 37 N Tesla My Inventions The Autobiography of Nikola Tesla Hart Bros 1982 38 M S Trotter and G D Durgin Survey of range improvement of commercial rfid tags with power optimized waveforms In IEEE RFID 2010 39 M S Trotter J D Griffin and G D Durgin Power optimized waveforms for improving the range and reliability of rfid systems In IEEE RFID 2009 40 C Valenta and G Durgin Harvesting wireless power Survey of energy harvester conversion efficiency in far field wireless power transfer systems IEEE Microwave Magazine 2014 41 H Visser A Reniers and J Theeuwes Ambient rf energy scavenging Gsm and wlan 58
power density measurements In EuMC 2008 42 B Waters A Sample P Bonde and J Smith Powering a ventricular assist device vad with the free range resonant electrical energy delivery free d system Proceedings of the IEEE 2012 59