Patents by Inventor Hongmei Deng

Hongmei Deng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240136577
    Abstract: In order to solve the problem that the existing manganese-based positive electrode material battery has insufficient high-temperature cycle and high-temperature storage performances due to the dissolution of manganese ions, the present application provides a secondary battery, comprising a positive electrode, a negative electrode and a non-aqueous electrolyte, the positive electrode comprises a positive electrode material layer containing a positive electrode active material, the positive electrode active material comprises a manganese-based material, and the non-aqueous electrolyte comprises a solvent, an electrolyte salt and an additive, and the additive comprises a compound represented by structural formula 1: the secondary battery meets the following requirements: 0.05?100×W×u/(q×s)?5; and 2.0 g/Ah?W?4.5 g/Ah, 0.05%?u?3.5%, 5%?q?65%, 10 mg/cm2?s?30 mg/cm2.
    Type: Application
    Filed: November 16, 2022
    Publication date: April 25, 2024
    Inventors: Yonghong Deng, Yunxian Qian, Shiguang Hu, Xionggui Lin, Hongmei Li
  • Patent number: 11680658
    Abstract: A linear actuator (1) comprising a first part (3) and a second part (5) is disclosed. The first part (3) is arranged to rotate along with a rotating part (4) of a motor (2), and the second part (5) is arranged to drive an actuated part (18, 22). A coupling (6) interconnects the first part (3) and the second part (5) to allow the second part (5) to rotate along with the first part (3) at the same angular velocity as the first part (3). The coupling (6) defines a fit tolerance between the first part (3) and the second part (5) allowing the first part (3) to rotate a predefined distance before engaging the second part (5) and rotating the second part (5) along with the first part (3). The fit tolerance ensures that the first part (3) reaches a certain angular velocity and thereby that the resulting torque transfer from the first part (3) to the second part (5) is sufficient, e.g. to release the actuated part (18, 22) from a pre-tensioned state.
    Type: Grant
    Filed: December 6, 2016
    Date of Patent: June 20, 2023
    Assignee: Danfoss A/S
    Inventors: Kurt Harck, Hongmei Deng, Birthe Nissen Reese, Jens Pawlik, Sigurd Larsen, Detlef Matzen
  • Publication number: 20180363797
    Abstract: A linear actuator (1) comprising a first part (3) and a second part (5) is disclosed. The first part (3) is arranged to rotate along with a rotating part (4) of a motor (2), and the second part (5) is arranged to drive an actuated part (18, 22). A coupling (6) interconnects the first part (3) and the second part (5) to allow the second part (5) to rotate along with the first part (3) at the same angular velocity as the first part (3). The coupling (6) defines a fit tolerance between the first part (3) and the second part (5) allowing the first part (3) to rotate a predefined distance before engaging the second part (5) and rotating the second part (5) along with the first part (3). The fit tolerance ensures that the first part (3) reaches a certain angular velocity and thereby that the resulting torque transfer from the first part (3) to the second part (5) is sufficient, e.g. to release the actuated part (18, 22) from a pre-tensioned state.
    Type: Application
    Filed: December 6, 2016
    Publication date: December 20, 2018
    Inventors: Kurt Harck, Hongmei Deng, Birthe Nissen Reese, Jens Pawlik, Sigurd Larsen, Detlef Matzen
  • Patent number: 10019576
    Abstract: A security control system is provided that works as an extra layer of defense as a way to prevent an “attack” that is initiated by modifying either the “jump” or the “return” addresses or both. The principal behind the security control system is to “monitor” the addresses to which the processors would jump, interrupt or return, and identify when these addresses are modified in a manner that does not comply with the normal execution of the processor. In order to do that the security control system uses existing structures in multi-core processors and even anticipates the creation of additional structures to expedite and improve such control.
    Type: Grant
    Filed: April 1, 2016
    Date of Patent: July 10, 2018
    Assignee: Intelligent Automation, Inc.
    Inventors: Guang Jin, Hongmei Deng, Brandon James Knapp, Andrew William Henderson, Joshua Brandon Tuttle, Renato Levy
  • Patent number: 9619074
    Abstract: Provided is a conversion method for key operations on a non-touch screen terminal unit, involving the steps of: detecting a click action on a target key on the terminal unit, and acquiring the ID information of the target key; searching position information corresponding to the ID information in a preset profile according to the ID information; and, generating a touch screen event at the position indicated by the position information on the display screen of the terminal unit. With the present method, application programs developed for touch screens can run on non-touch screen terminal units compatibly, and thereby the compatibility of the terminal units is improved.
    Type: Grant
    Filed: July 16, 2014
    Date of Patent: April 11, 2017
    Assignee: SUZHOU SNAIL TECHNOLOGY DIGITAL CO., LTD.
    Inventors: Kezun Yang, Lei Lei, Handong Feng, Hongmei Deng, Pengfei Deng
  • Publication number: 20160018937
    Abstract: The embodiments of the present invention disclose a conversion method for key operations on anon-touch screen terminal unit, comprising: detecting a click action on a target key on the terminal unit, and acquiring the ID information of the target key; searching position information corresponding to the ID information in a preset profile according to the ID information; and, generating a touch screen event at the position indicated by the position information on the display screen of the terminal unit. With the present invention, application programs developed for touch screens can run on non-touch screen terminal units compatibly, and thereby the compatibility of the terminal units is improved.
    Type: Application
    Filed: July 16, 2014
    Publication date: January 21, 2016
    Inventors: Kezun Yang, Lei Lei, Handong Feng, Hongmei Deng, Pengfei Deng
  • Patent number: 8050409
    Abstract: As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. The present invention provides for a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing. Without any assumption of pre-fixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system. The identity-based cryptography mechanism provided not only to provide end-to-end authenticity and confidentiality, but also saves network bandwidth and computational power of wireless nodes.
    Type: Grant
    Filed: April 4, 2005
    Date of Patent: November 1, 2011
    Assignee: University of Cincinnati
    Inventors: Dharma P. Agrawal, Hongmei Deng, Anindo Mukherjee
  • Publication number: 20060023887
    Abstract: As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. The present invention provides for a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing. Without any assumption of pre-fixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system. The identity-based cryptography mechanism provided not only to provide end-to-end authenticity and confidentiality, but also saves network bandwidth and computational power of wireless nodes.
    Type: Application
    Filed: April 4, 2005
    Publication date: February 2, 2006
    Inventors: Dharma Agrawal, Hongmei Deng, Anindo Mukherjee