1. A core-shell cathode active material comprising a core comprising a lithium transition metal oxide and a shell formed by coating the surface of the core with a transition metal oxide.
2. The core-shell cathode active material according to claim 1, wherein the lithium transition metal oxide is selected from the group consisting of LiCoO2, LiMn2O4, LiMnO2, LiNiO2, LiNi1-xCoxO2 (0<X<1), Li\u2014Ni\u2014Mn-based composite oxides, and Li\u2014Ni\u2014Mn\u2014Co-based composite oxides.
3. The core-shell cathode active material according to claim 1, wherein the transition metal oxide is represented by Formula 1:
MOx \u2003\u2003(1)
wherein M represents at least one transition metal selected from the group consisting of Mn, Ru, Co, Ni, and Fe, O represents oxygen, and x represents the number of oxygen atoms bonded to the transition metal M.
4. The core-shell cathode active material according to claim 1, wherein the transition metal oxide is present in an amount of 1 to 30% by weight, based on the weight of the lithium transition metal oxide.
5. A method for producing a core-shell cathode active material, comprising
i) mixing a transition metal oxide precursor with a lithium transition metal oxide core in a solution,
ii) allowing the mixed solution to react in an inert or reducing atmosphere to obtain a coprecipitate or a composite, and
iii) collecting the coprecipitate or the composite by filtration, followed by drying.
6. The method according to claim 5, wherein the transition metal oxide precursor is a solution of a metal alkoxide, an organic solution of a metal salt, or an aqueous solution of a metal.
7. The method according to claim 6, wherein the metal is selected from the group consisting of Mn, Ru, Co, Ni, and Fe.
8. The method according to claim 5, wherein the lithium transition metal oxide is selected from the group consisting of LiCoO2, LiMn2O4, LiMnO2, LiNiO2, LiNi1-xCoxO2 (0<X<1), Li\u2014Ni\u2014Mn-based composite oxides, and Li\u2014Ni\u2014Mn\u2014Co-based composite oxides.
9. The method according to claim 5, wherein the reducing agent is hydrazine or polyethylene glycol.
10. The method according to claim 5, wherein, in step ii), the reaction time is from 1 to 5 hours.
11. A hybrid capacitor comprising:
a cathode comprising the core-shell cathode active material according to claim 1;
an anode comprising an anode active material;
a separator; and
an electrolyte comprising a lithium salt.
12. The hybrid capacitor according to claim 11, wherein the cathode further comprises a binder.
13. The hybrid capacitor according to claim 12, wherein the binder is selected from the group consisting of polyimide, polyethylene, polypropylene, polyvinyl alcohol, polyvinyl chloride, styrene-butadiene rubbers, cellulose-based polymers, nitrile-based polymers, and fluorinated polymers.
14. The hybrid capacitor according to claim 11, wherein the cathode further comprises a conductive material.
15. The hybrid capacitor according to claim 14, wherein the conductive material is conductive carbon, a conductive metal, or a conductive polymer.
16. The hybrid capacitor according to claim 11, wherein the lithium salt is selected from the group consisting of LiPF6, LiBF4, LiClO4, Li(CF3SO2)2, LiCF3SO3, LiSbF6, and LiAsF6.
17. The hybrid capacitor according to claim 11, wherein the anode active material comprises active carbon, graphite-based carbon, or lithium ion-intercalated graphite-based carbon.
The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.
1. A method comprising:
identifying a compliance policy for using a remote device with an enterprise computer system, wherein the remote device is registered to access the enterprise computer system;
detecting, based on the compliance policy, a non-compliance of the remote device;
assessing, by a computer system, based on the compliance policy, a level of non-compliance of the remote device;
establishing, based on the compliance policy and the level of non-compliance, a time period for remediation of the non-compliance;
receiving a request to access a computing resource in the enterprise computer system;
providing access to the computing resource based on the level of non-compliance;
inhibiting access to the computing resource in the enterprise computer system based on the level of non-compliance and based on determining that the time period has expired; and
instructing the remote device to perform an action to remedy the non-compliance based on determining that the time period has expired.
2. The method of claim 1, wherein the compliance policy indicates the action to remedy the non-compliance and indicates a time period for performing the action.
3. The method of claim 1, wherein the compliance policy indicates a condition for the non-compliance, and wherein the condition is based on a first user role, and wherein the compliance policy identifies the time period for remediation of the non-compliance and the action for remedying the non-compliance based on determining that the condition is satisfied.
4. The method of claim 3, further comprising:
identifying a user role associated with an identity of a user of the remote device, the user role enabling the identity to access the enterprise computer system; and
determining that the condition is satisfied based on the user role matching the first user role.
5. The method of claim 3, further comprising:
determining one or more device attributes of the remote device and a geolocation of the remote device, wherein the condition is further based on a remote device attribute and a remote device geolocation; and
determining that the condition is satisfied based on the remote device attribute matching a device attribute of the remote device and based on the geolocation of the remote device matching the remote device geolocation.
6. The method of claim 1, wherein the non-compliance of the remote device includes altering a hardware configuration of the remote device.
7. The method of claim 1, wherein the non-compliance of the remote device includes installing a blacklisted application on the remote device.
8. The method of claim 1, wherein the non-compliance of the remote device includes use of the remote device in a manner that is non-compliant with a policy related to registration of the remote device to access the enterprise computer system.
9. The method of claim 1, wherein the non-compliance of the remote device includes adjusting a security configuration of the remote device in a manner that is non-compliant with a security policy for accessing the enterprise computer system.
10. The method of claim 1, further comprising:
wherein access to the computing resource is provided based on determining that the level of non-compliance satisfies a compliance threshold, and wherein access to the computing resource is inhibited based on determining that the level of non-compliance does not satisfy a compliance threshold.
11. The method of claim 1, further comprising:
identifying a second compliance policy for using the remote device with the enterprise computer system, wherein the compliance policy is a first compliance policy that is different from the second compliance policy;
detecting a second non-compliance of the remote device based on the second compliance policy; and
wherein the time period is established based on selecting a time period from one of the first compliance policy or the second compliance policy.
12. The method of claim 11, further comprising:
assessing, based on the second compliance policy, a second level of non-compliance of the remote device, wherein the level of non-compliance corresponds to a first level of non-compliance, and wherein the time period is selected based on comparing the first level of non-compliance or the second level of non-compliance.
13. The method of claim 1, wherein the action includes preventing access to use of the remote device with the enterprise computer system.
14. The method of claim 1, wherein the action includes altering registration of the remote device to access the enterprise computer system.
15. A non-transitory computer-readable medium for protecting a computer from an electronic communication containing malicious code, comprising instructions stored thereon, that when executed on a processor, perform the steps of claim 1.
16. A system comprising:
one or more processors; and
a memory storing instructions that, when executed by the one or more processors, cause the one or more processors to:
identify a compliance policy for using a remote device with an enterprise computer system, wherein the remote device is registered to access the enterprise computer system;
detect, based on the compliance policy, a non-compliance of the remote device;
assess, by a computer system, based on the compliance policy, a level of non-compliance of the remote device;
establish, based on the compliance policy and the level of non-compliance, a time period for remediation of the non-compliance;
receive a request to access a computing resource in the enterprise computer system;
provide access to the computing resource based on the level of non-compliance;
inhibit access to the computing resource in the enterprise computer system based on the level of non-compliance and based on determining that the time period has expired; and
instruct the remote device to perform an action to remedy the non-compliance based on determining that the time period has expired.
17. The system of claim 16, wherein the instructions, when executed by the one or more processors, further cause the one or more processors to:
identify a second compliance policy for using the remote device with the enterprise computer system, wherein the compliance policy is a first compliance policy that is different from the second compliance policy;
detect a second non-compliance of the remote device based on the second compliance policy; and
assess, based on the second compliance policy, a second level of non-compliance of the remote device, wherein the level of non-compliance corresponds to a first level of non-compliance, and
wherein the time period is established based on selecting a time period from one of the first compliance policy or the second compliance policy.
18. A method comprising:
identifying a compliance policy for using a remote device with an enterprise computer system, wherein the remote device is registered to access the enterprise computer system;
detecting, by a computer system, a non-compliance of the remote device based on the compliance policy;
categorizing the non-compliance into a level of non-compliance based on the compliance policy and establishing a time period for remediation of the non-compliance;
allowing access to a first computing resource in the enterprise computer system despite the level of non-compliance;
inhibiting access to a second computing resource in the enterprise computer system based on the level of non-compliance;
determining that the time period has passed;
inhibiting access to the first computing resource in the enterprise computer system based on the level of non-compliance and based on determining that the time period has passed; and
transmitting a message to the remote device based on determining that the time period has passed, wherein the message instructs the remote device to automatically remedy the non-compliance.
19. The method of claim 18, wherein the time period is stored with the compliance policy and is established based on the level of non-compliance.
20. The method of claim 18, wherein the compliance policy is a first compliance policy associated with a user role for accessing the enterprise computer system, and wherein the method further comprises:
identifying a second compliance policy for using the remote device to access the enterprise computer system;
observing a second non-compliance of the remote device based on the second compliance policy; and
selecting the time period from the first compliance policy for implementation over a time period of the second compliance policy.