摘要:
The present disclosure relates generally to indicating an end of life condition of an electrochemical device, and more particularly to systems and methods for sensing and determining an end of life condition in a cell comprising a high capacity cathode material suitable for use in a non-aqueous electrochemical cell. The high capacity cathode material has an amorphous or semi-crystalline form of copper manganese oxide, and optionally fluorinated carbon. The present disclosure additionally relates to transmitting the determined end of life condition to a user or monitoring device of the cell.
摘要:
The present disclosure relates generally to indicating an end of life condition of an electrochemical device, and more particularly to systems and methods for sensing and determining an end of life condition in a cell comprising a high capacity cathode material suitable for use in a non-aqueous electrochemical cell. The high capacity cathode material has an amorphous or semi-crystalline form of copper manganese oxide, and optionally fluorinated carbon. The present disclosure additionally relates to transmitting the determined end of life condition to a user or monitoring device of the cell.
摘要:
An activation mechanism for a reserve battery cell generally includes a housing with a chamber containing an electrolytic solution and a delivery device configured to discharge the electrolytic solution from the housing. The delivery device includes a compressed spring configured to be released in response to an external force to initiate the discharge of the electrolytic solution from the housing.
摘要:
An activation mechanism for a reserve battery cell generally includes a housing with a chamber containing an electrolytic solution and a delivery device configured to discharge the electrolytic solution from the housing. The delivery device includes a compressed spring configured to be released in response to an external force to initiate the discharge of the electrolytic solution from the housing.
摘要:
A system and method for charging a rechargeable, or secondary, battery including a series string of cells, includes a topology of charging sources that selectively provides charging current to cells that need to be charged, but avoids overcharging cells that are already charged above a predetermined voltage threshold. Based on individual cell voltage measurements, the charging current is controlled in a manner to direct charging current to the battery cell(s) needing charge until these cells are fully charged, and by-passes battery cells that are fully charged or become fully charged.
摘要:
A system and method for charging a rechargeable, or secondary, battery including a series string of battery cells, a topology of charging sources that selectively provides charging current to battery cells that need to be charged, but avoids overcharging battery cells that are already charged above a predetermined voltage threshold. Based on individual cell voltage measurements, the charging current is controlled in a manner to direct charging current to the battery cell(s) needing charge until these cells are fully charged, and bypasses battery cells that are fully charged or become fully charged.
摘要:
A system and method for charging a rechargeable, or secondary, battery including a series string of cells, includes a topology of charging sources that selectively provides charging current to cells that need to be charged, but avoids overcharging cells that are already charged above a predetermined voltage threshold. Based on individual cell voltage measurements, the charging current is controlled in a manner to direct charging current to the battery cell(s) needing charge until these cells are fully charged, and by-passes battery cells that are fully charged or become fully charged.
摘要:
A system and method for charging a rechargeable, or secondary, battery including a series string of cells, includes a topology of charging sources that selectively provides charging current to cells that need to be charged, but avoids overcharging cells that are already charged above a predetermined voltage threshold. Based on individual cell voltage measurements, the charging current is controlled in a manner to direct charging current to the battery cell(s) needing charge until these cells are fully charged, and by-passes battery cells that are fully charged or become fully charged.
摘要:
Automatic configuration of devices upon introduction into a networked environment, can be implemented, for example, by having a device randomly generate a series of letters and/or numbers, e.g., generate a PIN (Personal Identification Number) that encodes temporary credentials that, in addition to proving ownership and/or control over the device by virtue of having access to the PIN, also allows creating a temporary secure communication channel based on the PIN over which permanent security credentials may be transferred to the device to facilitate provisioning it to securely communicate in the networked environment. In a wireless scenario, a unique SSID and encryption key (WEP or WPA) may be determined as a function of the PIN, where both the device and its access point utilize the PIN to establish a temporary secure communication channel. Various techniques may be used to establish ownership and/or control over the device to prevent inadvertent association of the device with a wrong networked environment.
摘要:
Automatic configuration of devices upon introduction into a networked environment, can be implemented, for example, by having a device randomly generate a series of letters and/or numbers, e.g., generate a PIN (Personal Identification Number) that encodes temporary credentials that, in addition to proving ownership and/or control over the device by virtue of having access to the PIN, also allows creating a temporary secure communication channel based on the PIN over which permanent security credentials may be transferred to the device to facilitate provisioning it to securely communicate in the networked environment. In a wireless scenario, a unique SSID and encryption key (WEP or WPA) may be determined as a function of the PIN, where both the device and its access point utilize the PIN to establish a temporary secure communication channel. Various techniques may be used to establish ownership and/or control over the device to prevent inadvertent association of the device with a wrong networked environment.