This paper describes an EDA (
Electronic Data Automation) method and 
computer software invention for 
connectivity verification of IC 
mask Layout database versus IC 
Schematic; LVS Check (LVS: IC 
Layout versus IC 
Schematic) over 
the internet. The technique takes 
advantage of a unique 
algorithm to check the 
mask layout database connectivity, compare it with its corresponding 
schematic diagram for any mismatches in the 
mask layout polygons connections. The input of the tool is a mask 
layout database blocks (i.e.: IC layout) that were made manually and / or automatically using synthesized tools. These blocks may have some 
connectivity mismatches that need to be fixed in order to match the corresponding 
integrated circuit (IC) 
schematic diagrams. The output of the 
software tool is a text based descriptive log file and errors markers pointers that may be read into the mask layout database in order to point any connectivity mismatches of the mask layout database, comparing it to its corresponding 
schematic diagram. The end result is a mask layout set of markers and a text format log file that describes any mismatched connections in the mask layout database, comparing it to its corresponded schematic diagram. The 
software performs on individual mask layout blocks and / or on hierarchical structure of mask layout blocks. The 
system works hierarchically and / or flat. 
System also checks mask layout database incrementally, means only blocks that have been changed are checked. The 
system can be run via 
the internet using our secured protocol. The 
system offer a web based control panel to execute all necessary setups for submitting LVS check over 
the internet. The system offers the option to run on a 
local machine (user's computer) or on the main 
server over the internet. (Inventor's computer) The system also offers a PDA (Personal Digital Assistant) interface to launch LVS runs via industry's standard PDA's. The procedure is fully secured by 128 bit security protocol. All necessary file including mask layout GDSII (or GDSIII) file, 
netlist and technology file are securely encrypted using 128 bit protocol and send to the remote 
server. These files are decrypted and submitted for LVS check on the remote servers. The main remote 
server is distributing the task among other computer system for advanced 
parallel processing to achieve fast results. All results log files are encrypted using 128 bit security protocol and available for download by the user. In case of local LVS check the results files are available on the user's 
local machine.