Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

75 results about "Protocol verification" patented technology

Verification Protocols. Verification protocols promoted uniform controlled testing for a class or category of technologies. They may have retained draft status until the testing was performed and were then finalized by building on the testing experience. In some cases, documentation of a robust test protocol allowed for the development...

Verification method of FPGA universal configurable UART protocol based on UVM

The invention relates to a verification method of an FPGA universal configurable UART protocol based on UVM. The verification method comprises the steps of finishing an overall framework of UART protocol verification by utilizing a UVM verification platform structure and a verification idea; and setting a UART configuration type in which all the parameter information of the UART protocol is packaged, and sending the UART protocol parameter information to related parts of platforms such as a driver, a monitor and a grade recording board through a config-db mechanism provided by the UVM. During instantiation of a top layer, a universal parameter-configurable UART protocol FPGA verification platform can be realized only by setting corresponding parameter information such as a Baud rate, a data bit, a stop bit and a verification mode based on protocol requirements of a to-be-tested UART by the user. The verification method of the FPGA universal configurable UART protocol based on the UVM has the advantages of being efficient and universal. A test case meeting requirements can be generated automatically only by setting corresponding UART parameters at the top layer by an FPGA design engineer or verification engineer, and a verification environment is unnecessary to develop again, so that the verification efficiency is improved greatly.
Owner:CHINA ELECTRONIC TECH GRP CORP NO 38 RES INST

Law enforcement recording system, law enforcement recording device and law enforcement recording method

The invention discloses a law enforcement recording system, a law enforcement recording device and a law enforcement recording method, wherein the system comprises an upper computer and a plurality of law enforcement recorders managed by the upper computer; by means of an installed management platform, the upper computer verifies the encryption protocol when a law enforcement recorder accesses the system, and provides a device selection interface for the law enforcement recorder; the law enforcement recorder verifies the encryption protocol by means of a protocol verification module when being connected with the upper computer; after the device selection interface of the management platform is selected, a command receiving module is utilized to receive the starting command of the upper computer, and a law enforcement operation command is outputted to a law enforcement recording module. The invention can use only one upper computer to manage a plurality of law enforcement recorders and then utilize the operating platform to automatically carry out various operations in batches, consequently, the management efficiency can be greatly increased, and meanwhile, the error rate also can be greatly decreased or prevented.
Owner:深圳众里飞扬科技有限公司

Device and method for consistency protocol verification of interfaces S1 of LTE (Long Term Evolution) wireless network

The embodiment of the invention discloses a device and method for consistency protocol verification of interfaces S1 of an LTE (Long Term Evolution) wireless network. The device comprises an interface S1 module, an exchange module and at least two analog core network modules, wherein the interface S1 module is used for simultaneously receiving interface S1 test data sent by different base stations, determining the corresponding relationship between the different base stations and the analog core network modules through exchange processing, and transmitting the interface S1 test data from the different base stations to respective corresponding analog core network modules through the exchange module; and the analog core network modules are used for simultaneously processing the interface S1 test data which is received from the exchange module and comes from the different base stations, and transmitting a first response signal to the interface S1 module through the exchange module. The device and the method have the advantages that the consistency protocol verification on the interfaces S1 between multiple base stations and multiple analog core network modules can be simultaneously carried out, and the requirements of LTE for rapid network deployment are met.
Owner:WUHAN HONGXIN TELECOMM TECH CO LTD

Method for verifying Cache coherence protocol and multi-core processor system

The invention provides a method for verifying a Cache coherence protocol and a multi-core processor system. The method for verifying the Cache coherence protocol comprises the following steps that: a plurality of queues are arranged in a monitor, every queue comprises a plurality of units, the units are used for recording all primary requests which are not processed completely, all the requests which are relevant to addresses are orderly stored in the units of the same queue according to the sequence in which the requests enter a coherence processing element, and every unit is used for tracking the performance status of recorded requests independently. According to the characteristic that the method for verifying the Cache coherence protocol based on the monitor in the invention can process the requests relevant to the memorized and accessed addresses in sequence according to the Cache coherence protocol, the monitor is used for monitoring the protocol-level behavior of the Cache coherence processing element accurately, and the behavior of every request package can be monitored accurately. Through adjusting the content in the monitor, the method for verifying the Cache coherence protocol is suitable for verifying various coherence protocols.
Owner:JIANGNAN INST OF COMPUTING TECH

Checker based on SERDES protocol verification and functional verification system and method

ActiveCN106991027AIncrease flexibilityImprove the reusability of different designsError detection/correctionData streamNetwork packet
The invention provides a checker based on SERDES protocol verification and a functional verification system and method. The checker comprises a design module to be checked, an instruction receiving and sending module for sending instructions, a decoding module for decoding a coded data stream to be checked, a storage module for storing non-coded data, and a check module for reading the non-coded data and conducting functional verification. The method includes the steps that a data stream to be checked is received, if the data stream is coded data, decoding is conducted to obtain non-coded data and control word information contained in the code stream is output, and if the data stream is non-coded data, the data stream is directly received; the non-coded data is stored; the non-coded data is read, and functional verification is conducted on the non-coded data according to an external instruction. The checker can be reused in the data output port of any design module to be checked, supports verification of various code stream sequences or data packages in different frame formats and supports verification of coded/non-coded functional modules, the verification flexibility and different-design reusability are improved, the cost is reduced, and the function coverage of verification is increased.
Owner:SHANGHAI ADVANCED RES INST CHINESE ACADEMY OF SCI +1

Ad-Hoc routing protocol verification method based on BeagleBone-Black

InactiveCN107086957AWork lessQuickly know the end-to-end delayData switching networksPacket loss rateDependability
The invention provides an Ad-Hoc routing protocol verification method based on BeagleBone-Black. The method comprises the following steps that step 1 the system core of a useless module component is removed to be transplanted to the BeagleBone-Black system of each equipment node; step 2 a routing protocol requiring verification is transplanted to the system, and external network card parameters are configured so that the node is enabled to normally receive and transmit data; step 3 multiple equipment nodes are started to operate the routing protocol in the outdoor onsite scene, the working mode is configured as Ad-Hoc, the external sensor of the system also searches signals, the customized software is started on one node to search and forward a target host in the network, and the end-to-end transmission delay and the packet loss rate of the data are observed at the target host side through the customized software; and step 4 all the equipment nodes are started to perform testing so as to obtain the verification result. With application of the technical scheme, the equipment nodes can be brought to the onsite scene so that the authenticity and the reliability of the experimental data can be further enhanced, and the system is enabled to have great application prospect by the simple and rapid networking mode.
Owner:GUILIN UNIV OF ELECTRONIC TECH

Security protocol verification method taking attacker as center

InactiveCN106411940AReduced number of intermediate statesReduce the numberTransmissionComputer hardwareProtocol design
The invention belongs to the field of computer security protocol verification methods, and specifically relates to a security protocol verification method taking an attacker as the center. The security protocol verification method comprises the steps of 1, setting an initial state according to a protocol verification target; 2, extracting an event to be handled in the state, sequentially judging whether the current state and the event conform to TRules or not; and performing judgment on states in a Resultstate, wherein if a certain state that attacker knowledge contains parameters required to be kept secret of a protocol exists, the state is secrecy abnormal state, and if a certain state that a protocol session scene is abnormal exists, the state is an authentication abnormal state, otherwise, the protocol design is secure. The security protocol verification method aims to consider time sequence contradiction in the state extension process, a back tracking mechanism is introduced into state extension, extended branches of invalid states do not appear in the state searching process, and the number of intermediate states is reduced; and state extension is driven by requirements of the attacker, the mode is not fixed, the number of branches is less, and the number of state spaces is reduced.
Owner:THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products