Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

786 results about "Reverse engineering" patented technology

Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon.

Complete denture designing and manufacturing method based on CAD/RP technology

InactiveCN101548911ARestore accuratelySimplify complicated proceduresDiagnostic recording/measuringSensorsWaxGraphics
The invention discloses a neutral zone complete denture manufacturing method based on a Computer Aided Design/RapidPrototyping (CAD/RP) technology. The method comprises the following steps: a complete denture artificial tooth three-dimensional image database is established on the basis of the parameterized positioning; the data of upper and lower edentulous jaws with centric relation and neutral zone jaw is collected on the basis of the three-dimensional laser scanning technology with spatial position relation; the complete denture artificial articulation conforming to the theory of neutral zone and complete denture balanced occlusion tooth arrangement is designed on the basis of reverse engineering software, the gum and the base conforming to the complete denture neutral zone theory and the aesthetic principle are designed on the basis of the reverse engineering software; a complete denture flask is designed and processed on the basis of the CAD/RP technology; and the complete denture restoration is finished through the manual tooth inserting and the adhesive applying. The invention creates the concept of a two-step method, finishes the manual tooth arrangement and the wax pattern preparation with the highest technical content and the most complex operation in the traditional fabrication by using the computer and rapid prototyping technology, can finish the full fabrication of the complete denture only by being finally aided with the simple manual step, i.e., the second step of the two-step method, greatly simplifies the complex working procedures of the traditional handwork process, improves the efficiency and the accuracy of restoration and realizes the transformation of the designing and manufacturing process of the complete denture from the manual mode to the digital mode.
Owner:PEKING UNIV SCHOOL OF STOMATOLOGY

Method for Capturing the Essence of Product and Service Offers of Service Providers

A computer implemented method of constructing a computer implemented knowledge base, of evaluating a plurality of invoices, of knowledge refinement and generation, as well as a computer implemented knowledge base for analyzing a plurality of invoices. The methods comprise receiving the invoices, semantic and logically analyzing them to identify the invoice items (parameters and algorithms of service providers, billing plans, user profile, consumption pattern and debits) and relations connecting them and construct the knowledge base. The knowledge base comprises a hierarchic taxonomy of billing plans related to services of any domain (telecommunications services, banking, insurance, utilities etc.) and a computer implemented generic invoice constructed in reverse engineering logic for simulating debits. Debit simulations are done in order to achieve: 1. recommendations for optimal billing plans. 2. Recommendations for possible detected billing errors. 3. recommendations concerning new plans and/or services, and their financial implications Improving the knowledge base may use genetic algorithms based on an analogous hierarchic structure of the taxonomy to a genetic hierarchy, and may proceed by refining billing plans and comparing the resulting debits. Novel Semantic-web and Artificial Intelligence (AI) methods are used.
Owner:WIZBILL

System and method of interlocking to protect software - mediated program and device behaviors

A method for rendering software resistant to reverse engineering. Replace at least one first constant (mathematical expression, etc.) in a computational expression with a second mixed mathematical and bitwise-Boolean expression, the first constant being simpler than the second expression and the second expression being based on the value or the variables found in the first constant (or expression). Evaluation of the second mixed mathematical and bitwise-Boolean expression produces a value preserving the value of the first constant, either: with the original value of the first constant or the original value of the result of the first expression, in which case the second mixed mathematical and bitwise-Boolean expression is obtained from the first constant by converting the first constant by mathematical identities; or, in an encoded form, as a new value, which can be converted back to the original value of the first constant by applying an information-preserving decoding function, in which case the second mixed mathematical and bitwise-Boolean expression is obtained from the first constant by modifying the first constant by a combination of conversion according to mathematical identities and transformation according to an information preserving encoding function.
Owner:CLOAKWARE CORP +1

Virtualization-based security apparatuses, methods, and systems

Apparatuses, devices, and methods for protecting content on a computer are disclosed that employ a novel hypervisor configured to segregate, or partition, hardware resources or portions thereof into protected and unprotected areas and devices. The partitioning, effectively hides protected hardware resources, such as the BIOS device, etc., from operating systems running on the computer. The hypervisor controls access resources into the protected area and limits the manner in which the operating systems on the computer can access the protected resources and content. The hypervisor can be configured to physically partition entire hardware resource or to employ virtualization technology to partition hardware resources, such as memory devices, into protected and unprotected areas that are virtually partitioned. The hypervisor of the present invention provides a new concept in employing anti-forensic techniques to bring about a protection mechanism that prevents unauthorized users including remote attackers who have obtained administrative access from accessing, reverse engineering, or otherwise exposing content protected. The content can generally be anything that can be maintained in a computer including data, algorithms, code, information and processes in general, etc., such as personal, sensitive, confidential and proprietary information and algorithms, and cryptographic keys.
Owner:NULLRING

Design method for molded surface of automobile cover part die based on molded surface deformation compensation

The invention discloses a design method for a molded surface of an automobile cover part die based on molded surface deformation compensation, which comprises the steps of predicting the contact state of the molded surface based on similar die numerical value simulation, outputting a compensation guide document for the molded surface of the die based on the dethickness of a manufactured piece and the elastic deformation of the die, using CAD (computer aided design) software to design the compensation molded surface of the die based on the guide document and outputting the CAD compensation molded surface, and outputting the repaired actual molded surface of the die by using a method based on reverse engineering. Under the premises of reasonable technical conditions and die structures, a CAE-CAD-CMM (computer aided engineering-computer aided design-capability maturity model) integration system for the molded surface of the automobile cover part die based on the dethickness of the manufactured piece and the elastic deformation compensation of the die is formed. The method can be adopted for quickening the design process of the molded surface of the automobile cover part die, reducing the manual grinding time, guarantees the fit precision of the molded surface of the die and the forming precision of the automobile cover part, and provides a new method for the high-quality short-period debugging work of the automobile cover panel die.
Owner:TIANJIN UNIV OF TECH & EDUCATION TEACHER DEV CENT OF CHINA VOCATIONAL TRAINING & GUIDANCE +1

Method and apparatus for reverse engineering integrated circuits by monitoring optical emission

A method and apparatus for reverse engineering an integrated circuit chip (IC chip) (120) utilizes an electrical circuit tester (114) for injecting a triggering signal into the IC chip (120) to exercise a circuit under test. In synchronization thereto, a PICA detector (116) monitors optical emissions from the circuit under test. A spatial data extractor, electrically coupled to the PICA detector, collects space information (124) from patterns of light emissions emitted by the circuit under test, and a timing data extractor, electrically coupled to the electrical circuit tester and to the PICA detector (116), collects time information (126) from the patterns of light emissions emitted by the circuit under test. A database memory (105) includes known data about the circuit under test and also includes at least one reference pattern for comparing a captured light emission pattern thereto to identify at least one circuit element in the circuit under test. A PICA data analyzer (108), electrically coupled to the database memory (105) and to the PICA detector (116), determines at least one of whether the circuit under test comprises a circuit element with a light emission pattern that matches one of the at least one reference pattern in the database memory (105), and the value contained in a memory in the IC chip (120).
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products