Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

254results about How to "Reduce verification time" patented technology

A highly automated intelligent contract formal verification system and method

The invention discloses a highly automated intelligent contract formal verification system and method. The method includes the following steps: step 001, converting an intelligent contract function requirement description document into an intelligent contract function requirement specification document described in a non-natural language, wherein the content of intelligent contract function requirement specification document includes target contract function specification description and security attribute description; step 002, creating a formal validation rule model library; step 003, automatically modeling the contract source code and/or bytecode by an automated modeling tool; step 004, parsing the abstract syntax tree generated in step 003, and allocating memory addresses for constantsand variables in the code; step 005, performing formal proof. The invention is adapted to program codes written in a plurality of high-level programming languages and also adapted to a plurality of formal languages, and simultaneously provides two automatic modeling modes of source code modeling and bytecode modeling, so that modeling can be carried out according to different modeling requirements of users, and the verification efficiency is further improved.
Owner:成都链安科技有限公司

Piggyback magneto-resistive read/write tape head with optimized process for same gap read/write

A magneto-resistive read/write tape head is provided for reading and writing to tape media along a tape head face. The tape head comprises a plurality of modules, each module comprising a read element and a write element spaced apart and terminating at the tape head face and formed over a substrate. The read element comprises a soft film bias layer and a hard film bias layer butted against the SFB layer. The write element comprises two pole tips spaced apart by a gap. The tape head further includes a plurality of activating conducting coil turns operatively associated with the write element and covered by a cross-linked photoresist and positioned between the gap and one of the pole tips and set back from the tape head face. The tape head has at least one of the following elements: (a) a wear shield between the read element and the write element for limiting wear of the gap between the two pole tips, the wear shield being grounded for decoupling read and write functions of the tape head, for allowing same module read/servo/write functions simultaneously, and for grounding static charge from the tape media; (b) a layer of electrically conductive and corrosion-resis tant material, such as rhodium, under the hard film bias layer to reduce its resistance; and (c) a non-activating dummy coil turn closer to the pole tips than the activating coil turns for defining a forward termination of the cross-linked photoresist between the activating coil turns and the tape head face to thereby provide improved ease of processability.
Owner:IBM CORP

Universal method and platform for verifying compatibility between intellectual property (IP) core and advanced microcontroller bus architecture (AMBA) bus interface

The invention provides a universal platform of verifying compatibility between an intellectual property (IP) core and an advanced microcontroller bus architecture (AMBA) bus interface, which comprises a functional simulation tool, an AMBA bus infrastructure, a third-party verification IP core, a controller, a driver, a stimulus, a checker, an advanced peripheral bus (APB) bridge, an advanced high-performance bus (AHB) master interface, an AHB slave interface and an APB slave interface, wherein all the modules are connected to form an integrated coordinating verification environment by adopting a verification component and hierarchical packaging and interconnections ways provided by a SystemVerilog language and advanced verification methodology (AVM). The platform can verify the compatibility of different types of IP core interfaces, and the development time and cost of the verification platform and a verification method are reduced. The invention also provides the universal method for verifying the compatibility between the IP core and the AMBA bus interface. In the method, excitation is produced more normatively, scientifically and accurately, unnecessary iteration is reduced and the verification time is shortened.
Owner:SHANGHAI SILICON INTPROP EXCHANGE

Cloud lock management method and system based on network

The invention discloses a cloud lock management method and system based on a network. The system comprises a mobile communication terminal, a cloud server and cloud lock equipment, wherein the mobile terminal and the cloud lock equipment are connected with the cloud server by wireless communication; the mobile communication terminal acquires secret key information, and transmits the secret key information and an unlocking instruction to the cloud server; the cloud server receives the secret key information and the unlocking instruction, and verifies the secret key information and the unlocking instruction, and whether unlocking authority exists or not is judged according to a verification result; if the verification result shows that the unlocking authority exists, an awakening instruction and an unlocking instruction after verification is successful are transmitted to the cloud lock equipment; the cloud lock equipment receives the awakening instruction and the unlocking instruction after verification is successful; the awakening instruction awakens the cloud lock equipment from an intermittent dormancy state; and the unlocking instruction after verification is successful drives the cloud lock equipment to carry out unlocking operation. By the cloud lock management method based on the network, the unlocking speed is increased, the unlocking operation is speedy, power is saved, and the safety is good.
Owner:HUITAILONG DECORATION MATERIAL YUEXIU DIST GUANGZHOU

SOC verification system and method based on UVM

The invention relates to the technical field of chip verification, in particular to an SOC verification system and method based on UVM, and the system comprises a test excitation which covers design specifications and is randomly generated, a verification environment layer which is formed by combining a plurality of IP_ENVs, and a system-on-chip SOC based on a risc-v kernel. Each IP_ENV comprises a scoreboard, a kernel register, a reference model, an excitation generator, a driver and a monitoring module. When data sent by peripheral equipment to the SOC is verified, a verification environment is directly multiplexed to generate and send an excitation signal, and the scoreboard accesses the kernel register through a back door and automatically compares the kernel register with an expected value of the reference model to obtain a verification result; when the data sent to a bus by the SOC is verified, the excitation generator and the driver are closed, a driving program is loaded to the risc-v kernel, an IP module is driven by the on-chip bus to send the data, the monitoring module collects the sent data, and the scoreboard judges a final result. The system has the following beneficial effects that the verification time is greatly shortened while the test flexibility is ensured.
Owner:杭州德旺信息技术有限公司

Formation method for assistance graph

Disclosed is a formation method for an assistance graph. The formation method comprises the steps of providing a to-be-etched graph which comprises a plurality of main graphs; setting an initial assistance graph in the to-be-etched graph according to the distribution density of the main graphs in the to-be-etched graph; establishing an optical model according to parameter information of a to-be-implemented photoetching process; performing optical simulation through the optical model to obtain a simulation light intensity value when light penetrates through the initial assistance graph to arrival at photoresist in the photoetching process; if the maximum of the simulation light intensity value is less than an exposure critical value, completing the setting of the assistance graph; and if the maximum of the simulation light intensity value is greater than or equal to the exposure critical value, reducing the width of the initial assistance graph until the obtained simulation light intensity value is less than the exposure critical value, and completing the setting of the assistance graph. By virtue of the formation method, chip verification on the set assistance graph is not needed, so that chip verification time can be saved, and it is ensured that the assistance graph does not appear on the photoresist in the actual photoetching process.
Owner:SEMICON MFG INT (SHANGHAI) CORP +1

Station entrance identity authentication method based on two-dimensional code

The invention relates to a station entrance identity authentication method based on a two-dimensional code. The method particularly includes the following steps: S1) providing an electric operation and maintenance communication management and control system for collecting and storing identity information of operation and maintenance workers to generate identity identification information; S2) encrypting the identity identification information to generate a cipher text by a system; S3) converting the cipher text into a two-dimensional code image by the system and sending the two-dimensional code image to a mobile terminal of the operation and maintenance workers; S4) providing a two-dimensional code scanning device, so that when the operation and maintenance workers enter the station for maintenance and show the two-dimensional code image on the mobile terminal, the two-dimensional code scanning device scans the two-dimensional code and analyses the identity information of the workers, and sends the analyzed identity information to the system for identification; and S5) receiving the verification result from the system by the two-dimensional code scanning device. The method solves the problem of identity identification of the operation and maintenance workers through the two-dimensional code and data encryption technologies.
Owner:STATE GRID FUJIAN ELECTRIC POWER CO LTD +1

Network checking method for identity card validation

The invention discloses a method of checking identity certificate verification, which is used to realize check via the internet for verification of authenticity of identity certificate of individual customers through an identity certificate recognizing terminal provided with a networking check managing software and a special network. The steps of verifying check via network are: starting; opening the recognizing terminal and starting the managing software; recognizing whether the terminal has detected an identity certificate, and if a certificate has been detected, the recognizing terminal reads the identity certificate information and display the photo and related information on the recognizing terminal screen; the recognizing terminal transfers the request to the population information database of the Ministry of Public Security; the database checks the verification and feeding back the check results to the recognizing terminal; the recognizing terminal screen simultaneously displays photo and related information of the identity certificate requested for verification, and the check result, photo and related information are fed back from the population information database of the Ministry of Public Security to the recognizing terminal; and finishing the check and waiting for next verification check. The invention can be used for quickly and accurately checking authenticity of the identity certificate of an individual customer, i. e. the second generation of individual identity certificate.
Owner:SHANDONG SYNTHESIS ELECTRONICS TECH

Cucumber SNP marker and detection methods thereof

The invention relates to a cucumber SNP marker and detection methods thereof in the technical field of plant gene engineering. A method for identifying cucumber SNP locus comprises the following steps: selecting homozygous cucumber parents, and performing sequencing to determine candidate SNP locus; hybridizing to obtain F1 generation single plants, and performing sequencing; and detecting a peak shape chart of a F1 generation sequencing result to determine candidate locus with heterozygous peaks. A method for determining SNP marked polymorphic single plants in F2 generation separation group of cucumber comprises the following steps: selecting homozygous cucumber parents, and obtaining the F2 generation separation group; selecting recessive phenotype single plants in the F2 generation, mixing DNAs of the single plants in equal quantity, and construct a recessive gene pool; performing amplification and sequencing by an SNP primer, and detecting a peak shape chart of a sequencing result; and respectively performing amplification and sequencing on single plants in the recessive gene pool by the SNP primer, and detecting a peak shape chart of a sequencing result. The cucumber SNP marker has a sequence shown as SEQ ID NO:1. The invention shortens the development and testing time of the SNP marker, and reduces the detection cost of the marker.
Owner:SHANGHAI JIAO TONG UNIV

Block-chain-based automated test method and apparatus, computer device and storage medium

The invention relates to a block chain, which provides a block-chain-based automatic test method and apparatus, , a computer device and a storage medium. The method comprises the following steps: executing a new resource script in an interface script, sequentially calling corresponding resources to create new interfaces, and creating first block chain network resources corresponding to each resource to create new interfaces; determining a corresponding block chain resource creation result according to the returned creation result data; executing a node start script, starting a corresponding block chain node according to the node start script, and accessing the started block chain node into a corresponding channel; executing a running resource script in the interface script, sequentially calling corresponding resource running interfaces, and sequentially running corresponding second block chain network resources; according to the running result data returned by each resource running interface, determining the block chain resource running result is determined, and obtaining the block chain test result according to the block chain resource building result and the block chain resourcerunning result, which can quickly verify the functional usability of the block chain system.
Owner:PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products