Patent application number | Description | Published |
20090186258 | ION CONDUCTOR AND FUEL CELL - An ion conductor that has high ion conductivity, is hardly affected by environmental change, and thus can improve the safety is provided. As a first fluid F | 07-23-2009 |
20100323247 | ELECTROLYTE AND BATTERY - A battery using an electrolyte with which favorable ion conductivity is able to be secured at low temperature is provided. A solid electrolyte is provided between a cathode in which a cathode active material layer is formed on a cathode current collector and an anode in which an anode active material layer is formed on an anode current collector. The electrolyte contains carbon cluster such as fullerene and an electrolyte salt such as a lithium salt. Thereby, compared to an electrolyte composed of a polymer compound such as polyethylene oxide and a lithium salt, lowering of ion conductivity is inhibited at low temperature. | 12-23-2010 |
20110018490 | IC CARD - An IC card having a secondary battery, which causes no increase in thickness and also has excellent safety, is provided. The IC card includes an antenna coil for inducing electric power by electromagnetic induction, a thin-film battery for storing electric power induced by the antenna coil, and a control portion for controlling the storage of the electric power from the antenna coil in the thin-film battery. The thin-film battery includes a positive electrode, a negative electrode, and a solid electrolyte layer between the positive electrode and the negative electrode. | 01-27-2011 |
20110115440 | SECONDARY BATTERY CHARGE METHOD AND BATTERY CHARGER - Disclosed herein is a secondary battery charge method, including the steps of: conducting a pulsed charge control adapted to conduct a pulsed charge by repeating a cycle of a charge condition and a pause condition of a secondary battery at predetermined intervals; detecting a voltage detection adapted to detect the voltage of the secondary battery; determining a charge termination determination adapted to determine whether to terminate the charge of the secondary battery based on the battery voltage in a pause condition detected by the voltage detection step; and terminating a charge termination control adapted to terminate the pulsed charge when it has been determined by the charge termination determination step that the charge should be terminated. | 05-19-2011 |
20110162972 | METHOD FOR PRODUCING POSITIVE ELECTRODE OF THIN-FILM BATTERY AND METHOD FOR PRODUCING THIN-FILM BATTERY - A method for producing a thin-film battery includes a film-formation step of forming a film of a positive-electrode material to form a positive-electrode active material film and an annealing step of annealing the positive-electrode active material film. After the annealing step, a lithium-ion introduction step of introducing lithium ions into the positive-electrode active material film. After the introduction of the lithium ions, a reverse-sputtering step of edging the positive-electrode active material film by reverse sputtering. | 07-07-2011 |
20110274974 | THIN FILM SOLID STATE LITHIUM ION SECONDARY BATTERY AND METHOD OF MANUFACTURING THE SAME - In one embodiment, a thin film solid state lithium ion secondary battery is able to be charged and discharged in the air and manufactured stably at a favorable yield. The thin film solid state lithium ion secondary battery has an electric insulating substrate formed from an organic resin, an inorganic insulating film provided on the substrate face, a cathode-side current collector film, a cathode active material film, a solid electrolyte film, an anode potential formation layer, and an anode-side current collector film. The cathode-side current collector film and/or the anode-side current collector film is formed on the inorganic insulating film face. The anode potential formation layer is a layer formed from the same material as that of the cathode active material film or a material different from that of the cathode active material film and is a layer provided for forming anode potential at the time of discharge. | 11-10-2011 |
20110281167 | THIN FILM SOLID STATE LITHIUM ION SECONDARY BATTERY AND METHOD OF MANUFACTURING THE SAME - A high-performance and inexpensive thin film solid state lithium ion secondary battery that is able to be charged and discharged in the air and is able to be manufactured stably at a favorable yield, and a method of manufacturing the same are provided. The thin film solid state lithium ion secondary battery has an electric insulating substrate | 11-17-2011 |
20110287296 | THIN FILM SOLID STATE LITHIUM ION SECONDARY BATTERY AND METHOD OF MANUFACTURING THE SAME - In one example embodiment, a thin film solid state lithium ion secondary battery is charged and discharged in the air. The thin film solid state lithium ion secondary battery has an electric insulating substrate formed from an organic resin, an insulating film made of an inorganic material and is formed on the substrate face, a cathode-side current collector film, a cathode active material film, a solid electrolyte film, an anode active material film, and an anode-side current collector film. In the thin film solid state lithium ion secondary battery, the cathode-side current collector film and/or the anode-side current collector film is formed on the foregoing insulating film face. The area of the foregoing insulating film is larger than the area of the cathode-side current collector film or the anode-side current collector film or the total area of the cathode-side current collector film and the anode-side current collector film. | 11-24-2011 |
20110318614 | ELECTROLYTE, BATTERY USING SAME, AND METHOD OF USING SAME, AND METHOD FOR PRODUCING ELECTROLYTE - In one example embodiment, an electrolyte has favorable ionic conductivity at low temperatures. In one example embodiment, a solid electrolyte is provided between a cathode and an anode. In one example embodiment, the electrolyte is formed of electrolyte salt such as a lithium salt, carbon cluster such as fullerene, and a liquid having polarity and dissociating the electrolyte salts into ions like organic solvents such as acetone and ionic liquids such as EMITFSI (1-ethyl-3-methyl imidazolium bis(trifluoromethanesulfonyl)imide). | 12-29-2011 |
20130202972 | ELECTROLYTE AND SECONDARY BATTERY - A secondary battery capable of decreasing progression temperature of a precipitation-dissolution reaction of aluminum is provided. A cathode | 08-08-2013 |
20140127594 | ELECTROLYTE SOLUTION, METHOD FOR PRODUCING ELECTROLYTE SOLUTION, AND ELECTROCHEMICAL DEVICE - There is provided an electrolyte solution including a solvent formed from a sulfone, and a magnesium salt dissolved in the solvent. | 05-08-2014 |
20150280279 | ALUMINUM SECONDARY BATTERY AND ELECTRONIC DEVICE - An aluminum secondary battery includes a positive electrode | 10-01-2015 |
Patent application number | Description | Published |
20100055844 | Method of manufacturing semiconductor device - A method of manufacturing a semiconductor device, which is capable of easily removing a sealing sheet building up terminal surfaces of leads, includes arranging, on molds, terminal surfaces of leads in a lead frame on which semiconductor elements are mounted so as to come in contact with a sealing sheet, pouring a resin into the molds to form a resin sealed body including the semiconductor elements, and cleaning the resin sealed body, and the cleaning of the resin sealed body ravels the sealing sheet by a cleaning solvent and removes the sealing sheet. | 03-04-2010 |
20100290202 | Semiconductor package, lead frame, and wiring board with the same - A semiconductor package comprises a conduction member, a semiconductor chip mounted on and electrically connected to the conduction member, and a sealing body configured to seal the conduction member and the semiconductor chip. The conduction member comprises a power supply section configured to supply a power voltage to said semiconductor chip, a ground section configured to supply a ground voltage to the semiconductor chip, and a signal section connected to a signal terminal of the semiconductor chip. The power supply section, the ground section, and the signal section are arranged so as not to overlap each other. At least a part of said ground section is exposed on an under surface of the sealing body. The power supply section comprises an exposed region of which bottom surface is exposed on the under surface, and a plurality of power hanging-pin region configured to extend to a side of the sealing body from the exposed region. | 11-18-2010 |
20110266661 | LEAD FRAME AND METHOD FOR MANUFACTURING SEMICONDUCTOR DEVICE USING THE SAME - A semiconductor device is manufactured using a lead frame for a mold array package (MAP) where multiple mount parts are arranged in the shape of an array, each configured to have a semiconductor chip mounted thereon. Multiple leads for coupling to the semiconductor chip are formed in each of the mount parts of the lead frame. The tips of the leads are mutually coupled by tie bars thinner than the leads. A dummy lead having a slot coupling to the tie bar is formed on a portion corresponding to a portion further outside the tie bar and corresponding to a portion where the lead is formed in the mount parts at predetermined locations among the mount parts. Once the resin is supplied, air in a tie bar part is pushed out into the slot of the dummy lead; therefore, generation of void in the tie bar part can be controlled. | 11-03-2011 |
20130069214 | LEAD FRAME, SEMICONDUCTOR DEVICE, METHOD OF MANUFACTURING LEAD FRAME, AND METHOD OF MANUFACTURING SEMICONDUCTOR DEVICE - A lead frame or semiconductor device and a method of manufacturing the same in which where the unit lead frame of each semiconductor device after dicing was located in a lead frame before dicing can be known without an additional manufacturing step. The lead frame includes a plurality of unit lead frames each having a die pad, suspension leads coupled to the die pad, and leads formed around the die pad. An identification mark including at least one of a penetrating groove, recess, and convex is formed in at least one of the die pad, suspension leads, and leads. The identification mark of a first unit lead frame and the identification mark of a second unit lead frame are different from each other at least either in location in the unit lead frame or in shape. | 03-21-2013 |
Patent application number | Description | Published |
20090201901 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 08-13-2009 |
20100208713 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 08-19-2010 |
20100208714 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 08-19-2010 |
20100290421 | DECENTRALIZED WIRELESS COMMUNICATION SYSTEM, APPARATUS, AND ASSOCIATED METHODOLOGY - Communication stations select the channel which as many communication stations as possible can receive as a beacon sending channel based on interference information of each channel specified in a beacon signal. When there is a communication station which cannot receive a beacon, the beacon sending channel is changed. The communication stations can receive a beacon from all other communication stations by performing beacon receiving operation over a particular channel, avoiding the deadlock state. | 11-18-2010 |
20120243522 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 09-27-2012 |
20130242970 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 09-19-2013 |
20130322420 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-05-2013 |
20130322421 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-05-2013 |
20130329641 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-12-2013 |
20130329716 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-12-2013 |
20130329717 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-12-2013 |
20130329827 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-12-2013 |
20140362844 | WIRELESS COMMUNICATION SYSTEM, WIRELESS COMMUNICATION APPARATUS, WIRELESS COMMUNICATION METHOD, AND COMPUTER PROGRAM - Random access operation is performed under a communication environment in which a plurality of communication modes having different transmission rate coexist with small overhead. A high-grade communication station spoofs information of a packet length and a rate in a decoding portion so that a value of (packet length)/(rate) corresponds to a duration where the communication is hoped to be stopped. The other station receiving the spoofed information receives the rest of the packet with the designated rate during the interval designated by the value of (packet length)/(rate). In this case, the packet length and the rate are not those of actually transmitted packet so that this packet is discarded. | 12-11-2014 |