In a major ruling issued on 10 February this year, the US International Trade Commission (ITC) ruled on a dispute relating to claims that SK Innovation made use of LG Chem trade secrets surrounding their electric vehicle battery technology. The ITC investigation under US trade law centred on alleged instances of IP.
AI Customer Service >>
Data confidentiality is essential for protecting sensitive information from unauthorized access. The rise of technology has led to a massive increase in data generation, storage, and transfer, significantly expanding organizations'' data footprints.; The growing volume of sensitive business data makes it more vulnerable to threats from both malicious insiders
Dyson Technology Limited and Dyson Limited are subsidiaries of gs Pte. Ltd., a Dyson Holdin company based in Singapore (the "Company"). The Company and its subsidiaries (collectively referred to as "Dyson" or "Group") are a global group of technology companies committed to maintaining a high standard of corporate governance.
We offer a variety of levels of service through our Start, Scale and Life packages, which include Battery Technologies made to measure F.I.T batteries, chargers,
by Michael C. Anderson, Editor-in-Chief, Battery Technology. Industry Outlook. Barra Discusses GM''s Flexible ICE Production Amid EV Demand. Barra Discusses GM''s Flexible ICE
Typical measures include strong confidentiality agreements, limiting access to the secret information to those who "need to know," education of employees on the importance
Extensive research and development efforts are underway to improve battery performance, driven by the growing demand for advanced battery technology and investments from stakeholders, especially electric vehicle
Understanding the CIA Triad: The Pillars of Cybersecurity When it comes to protecting sensitive data and keeping information systems secure, three key principles form the backbone of cybersecurity:
A BMS is an embedded system designed to monitor and regulate the current, voltage and temperature of battery modules, thus maintaining battery cells within a safe operating zone. It is composed of
Extensive research and development efforts are underway to improve battery performance, driven by the growing demand for advanced battery technology and investments from stakeholders, especially
There are three major requirements for system data that are integrity, confidentiality, and availability. Data integrity implies that the measurements or commands
Confidentiality. Confidentiality is about ensuring access to data is restricted to only the intended audience and not others. As you may expect, the more sensitive the information is, the more stringent the security measures
It is a measure of the battery''s ability to sustain a certain level of power output over a specific period. These factors include the type of battery chemistry, temperature variations, and the battery''s age and usage patterns. As battery technology continues to evolve, we can expect significant improvements in energy density, charging
[Show full abstract] security includes data confidentiality, data integrity, and availability, and that measures include non-repudiation and access control. However, in practical IoT system
Electric vehicle battery technology reflects a combination of historical developments, innovations, and market demands. However, it falls short in energy density on both
Battery management systems (BMSs) play a critical and crucial role in ensuring the safety and the efficiency of the batteries. The increasing BMS complexity, th
Exponent''s deep expertise in battery technologies enables us to provide expert opinions and advisory services on diverse legal matters. We offer capabilities in intellectual property and trade secrets, with a proven track record of protecting
To qualify as a trade secret, federal law requires that "reasonable measures" be taken to keep the information secret. This presentation aims to inform how courts have treated
Key conclusions include the identification of an optimal configuration comprising a 589.58 kW PV system, 664 kW WT, a 675-kW supercapacitor, and a 1000 kWh battery bank.
Numerous recent innovations have been attained with the objective of bettering electric vehicles and their components, especially in the domains of energy management, battery design and
Reasonable measures typically include nondisclosure and confidentiality agreements, employee trainings, security restrictions, and exit interviews.[9] reliance on basic form confidentiality and assignment agreements may be insufficient. technology. Eventually, these seeming secrets may cross the threshold to being generally known and/or
This technology ensures that all parties involved in the patent transaction have access to the most up-to-date versions of confidential documents. By implementing these measures, patent transaction confidentiality is maintained, and the risk of data breaches is significantly mitigated. Redacted Document Control
Other companies developing Li-S battery technology include Sion Power, OXIS Energy, PolyPlus Battery Company, Sulfur8, Johnson Matthey, Samsung SDI, LG Chem, Morrow Batteries, and CATL. 3. Sodium-Ion Batteries. Like lithium-ion batteries, sodium-ion (Na-ion) batteries move sodium ions between the cathode and anode during charge and discharge.
Under Chinese law, whether the entity concerned has taken reasonable confidentiality measures to protect the information is an important factor in determining whether the information constitutes a trade secret and having
This holistic approach ensures that confidentiality measures are aligned with broader organizational goals and regulatory requirements. 7- Implement Robust
Determination of infringement of computer software trade secrets— Sunrise Technology Co., Ltd. v. AsiaInfo Technologies (China), Inc. et al.[1] Introduction. On 19 February 2020, the high profile trade secret infringement case, Sunrise Technology Co., Ltd.v. AsiaInfo Technologies (China), Inc. et al., was finally decided by Beijing Higher People''s Court (the
Understanding Confidentiality, Integrity, and Availability (CIA Triad) The CIA Triad, comprised of Confidentiality, Integrity, and Availability, has a crucial role in the realm of cybersecurity: Confidentiality protects sensitive information from unauthorised access, allowing only authorised individuals to utilise it.
The Shandong Higher People''s Court, in its Civil Judgment (2016)LMZ NO. 310, first determines the object of the confidentiality measures, i.e. the content of the information about business
Strategies to propel battery technology forward include improving supply chain efficiencies, developing alternative materials, and enhancing solid-state production techniques. Companies are addressing environmental concerns related to battery production through several strategic measures. First, they focus on sustainable sourcing of
Exclusion order – The ITC banned importation of SK''s electric vehicle batteries for 10 years prohibiting "the entry of certain lithium-ion batteries, battery cells, battery modules, battery
Battery cybersecurity measures are crucial to ensuring the longevity, safety, reliability, and energy storage system security of connected devices, including BESS systems.
of the UK''s battery manufacturing capabilities and enable battery technology innovation. Whilst most recommendations fall within the scope of the FBC, the roadmap extends beyond this remit of PASs and other measures 27 3.3.2 Enhancing uptake of existing and future standards 28 3.3.3 Testing and certification 28 3.3.4 Training and
Bolstering the digital security of battery systems involves implementing robust measures to protect against data tampering and theft. Cyber surveillance systems can deter unauthorised access and mitigate the risk of
Fig. 1 shows the global sales of EVs, including battery electric vehicles (BEVs) and plug-in hybrid electric vehicles (PHEVs), as reported by the International Energy Agency (IEA) [9, 10].Sales of BEVs increased to 9.5 million in FY 2023 from 7.3 million in 2002, whereas the number of PHEVs sold in FY 2023 were 4.3 million compared with 2.9 million in 2022.
The basic information security services are known to include confidentiality, integrity and availability, which are know as the CIA triad. This chapter introduces some basic concepts and techniques in cryptography, particularly some typical cryptographic methods to the CIA triad, i.e., encryption algorithms, message authentication codes, and digital signature
Nowadays, the battery energy storage system (BESS) has become an important component of the electric grid [1] can serve multiple services such as frequency regulation, voltage control, backup, black start, etc. [2].The inability to provide a requested service can compromise the reliability of electric grid operation, the drop of energy quality as well as the
These include older batteries like alkaline, zinc-carbon, and mercury-containing batteries. Energy density measures the energy a battery can store per unit volume,
Battery technology and risks. A battery is a device that converts chemical energy into electrical energy. There are various types, as follows: sources of information that may be utilised to determine whether risks are tolerable or whether additional risk control measures are necessary. This may include:
Crafting an effective intellectual property (IP) strategy is a cornerstone of protecting innovation, regardless of industry. An IP strategy with successful outcomes, often depends on whether the innovation can be kept
We discuss how ML and AI-based methods can support cyber defense of battery systems. Battery energy storage system (BESS) is an important component of a modern power system since it allows seamless integration of renewable energy sources (RES) into the grid.
Utility-scale battery energy storage systems are vulnerable to cyberattacks. There is a lack of extensive review on the battery cybersecure design and operation. We review the state-of-the-art battery attack detection and mitigation methods. We overview methods to forecast system components behavior to detect an attack.
Confidentiality is the feature of data that implies that data can be accessed only by authorized parties . A confidentiality attack is an attack in which system data is recorded and stolen by an unauthorized party. Some researchers state that confidentiality is not necessary for the system data .
Due to the EV being a spread application of batteries, most battery SOC forecast methods are tested on EV datasets. One of the common datasets described in the literature are Federal Urban Driving Cycles (FUDS), and US06. The efficiency of machine learning (ML) and ANN approaches application on different datasets is highlighted in .
Nowadays, the battery energy storage system (BESS) has become an important component of the electric grid . It can serve multiple services such as frequency regulation, voltage control, backup, black start, etc. .
Sensing units are placed in battery cells to control voltage, current, and temperature. In this work, we assume that the sensing units in batteries are protected and, therefore, the possibility of FDIA is eliminated. To prevent the attack against battery SOC, the forecasting methods can be applied.
We specialize in telecom energy backup, modular battery systems, and hybrid inverter integration for home, enterprise, and site-critical deployments.
Track evolving trends in microgrid deployment, inverter demand, and lithium storage growth across Europe, Asia, and emerging energy economies.
From residential battery kits to scalable BESS cabinets, we develop intelligent systems that align with your operational needs and energy goals.
HeliosGrid’s solutions are powering telecom towers, microgrids, and off-grid facilities in countries including Brazil, Germany, South Africa, and Malaysia.
Committed to delivering cutting-edge energy storage technologies,
our specialists guide you from initial planning through final implementation, ensuring superior products and customized service every step of the way.