Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

2894 results about "Verification" patented technology

Verification in the field of space systems engineering covers two verification processes: Qualification and Acceptance

Construction verification method and device capable of verifying security two-dimensional code offline

Embodiments of the invention provide a construction verification method and device capable of verifying a security two-dimensional code offline. The method comprises the following steps of inputting information that needs coding and type information, carrying out digital signature operation and encryption operation on the input information according to an information release type, constructing combination information, and encoding to generate a security two-dimensional code which can be verified off-line according to a two-dimensional code coding rule; inputting the information of the security two-dimensional code and identifying included combination information and type information, analyzing and decoding the combination information to obtain independent sub-information according to the type information of the two-dimensional code, and verifying digital certificate effectiveness information, a digital signature of the input information and an effective time limit of the input information; and if all verifications pass, showing that the offline verification of the security two-dimensional code is correct and the coding information source of the security two-dimensional code is credible, otherwise showing that the information release source of the security two-dimensional code is incredible. The method and the device have the beneficial effects that the security two-dimensional code cannot be tampered, counterfeited and denied, the public or private information can be released, and the integrity of the information of the security two-dimensional code and the authenticity of the source can be verified offline without a network connection.
Owner:王栋

Production line design and optimization method based on digital twinning

The invention relates to a production line design and optimization method based on digital twinning. The production line design and optimization method comprises the following steps: performing digital process design on a product, integrally planning a production line, constructing and integrating a digital twinning model of the production line, performing simulation verification on a virtual production line, constructing and implementing a physical production line, and performing virtual-real mapping and optimization on the production lines. According to the invention, the digital twinning model is constructed according to three levels of elements, behaviors and rules, and has production line evaluation, evolution and reasoning capabilities; a virtual production line model is established,virtual debugging and simulation operation of the virtual production line are achieved, the production line does not need to be constructed firstly, design risks are avoided, and debugging time is saved; and a virtual-real mapping relationship and an interaction mechanism between the virtual production line and the physical production line are established, statistical analysis is performed on theoperation data of the virtual production line, and optimization and management and control on the physical production line are realized.
Owner:SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI

Software upgrading bag packaging method and software upgrading method

The invention relates to a technique for safely updating a software and provides a software update packet packaging method for ensuring the legality and completeness of an updated software, as well as a software updating method. Digital certificates of trustworthy authentication institutes are prearranged in a terminal apparatus, or a server is used for determining the trustworthy authentication institutes; the authentication institutes respectively perform digital signing to the software and transmit an original cleartext software together with all digital signatures and digital certificates to the terminal apparatus; the terminal apparatus verifies whether all digital certificates are legal and judges the authentication institutes working together for updating the software; if all conditions are satisfied, the terminal apparatus verifies all digital signatures and then updates the software after the verification. As the legality of a software update packet is verified according to the digital certificates of the authentication institutes, the completeness of the software update packet is verified according to the digital signatures of the authentication institutes and a plurality of parties participate the concerted signing to the software, the safe update of the software is ensured.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Installing verification method for intelligent terminal application program and system

The invention discloses an installing verification method for an intelligent terminal application program. The method comprises the following steps: acquiring a first public key pre-stored in an intelligent terminal system layer; judging if a to-be-installed application program meets an installing condition according to the pre-stored first public key; if yes, allowing to install the to-be-installed application program; if not, forbidding the installing for the to-be-installed application program. The invention also provides a system for realizing the method. According to the installing verification method for the intelligent terminal application program provided by the invention, before the application program is installed, the pre-stored first public key of the system layer is utilized to judge if the application program meets the installing condition, and the application program can be installed when the installing condition is met, so that the application program on the terminal equipment being an authenticated legal program can be ensured; the installing for an illegal application program can be effectively prevented; the manageable and controllable terminal application can be ensured; the illegal entry and spreading of harmful information can be prevented; the benefits of operators and users can be protected.
Owner:北京视博数字电视科技有限公司

Software simulation verification method based on Cache coherence protocol

The invention provides a software simulation verification method based on a Cache coherence protocol. According to the method, pseudo random test which is capable of compiling constraint models and also carrying out band constraint in a manual mode is subject to software simulation and verification; specific objects are verified, and the accuracy and defect of the protocols are fed back. The method based on software simulation comprises the following steps of: firstly determining a multi-stage coherence description mode based on an expanded Cache Coherence protocol; and subsequently realizing the software simulation verification method, counting the coverage rate and carrying out error report. With the adoption of the method, the Cache Coherence protocol in multi-stage domains in a multi-state space can be verified effectively so as to enable a protocol table to realize the establishment of corresponding logic relationship, judge whether the state transition of a system in accordance with the protocol table accords with the coherence definition through an overall checker, and primarily judge whether a mode established in accordance with the protocol table has expected properties. The model system has the remarkable advantages that counter-examples can be generated automatically so as to assist in debugging errors of the system and accelerating system diagnosis and debugging.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Verification code input method and device

The invention provides a verification code input method and device, and the method comprises the steps: reading a short message; judging whether the short message is matched with a target application which needs to receive a verification code or not when the short message contains the verification code; enabling the verification code in the short message to be filled in a system paste board when the short message is matched with the target application, and adding privacy authority, wherein the privacy authority is used for shielding other applications different from the target application; and enabling the verification code in the system paste board to be filled in a verification input frame of the target application. In conclusion, the method can automatically analyzes the verification code, matched with the target application which needs to receive the verification code, from the content of the short message, and fills the verification code into the corresponding verification input frame. A user does not need to specially search the verification code from the short message, so the method and device are relatively simple in operation. In addition, the method adds privacy authority to the content of the system paste board, thereby preventing the leakage of the privacy of the user.
Owner:XIAOMI INC

Simulation and verification method of control method of near space aircraft

The invention relates to the simulation and the verification of a control method in the field of aerospace. In order to provide a simulation and verification platform capable of supporting a near space aircraft to real-time simulation tests and performance evaluation from the design of a flight control system, the technical scheme adopted by the invention is as follows: a simulation and verification method of the control method of the near space aircraft is realized by virtue of the following devices: a simulation master control machine and a dSPACE real-time simulation machine, wherein the simulation master control machine is provided with a DS817 high-speed serial communication interface plate; and the simulation master control machine is communicated with the DS814 high-speed serial communication interface plate of the dSPACE real-time simulation machine through an optical fiber. The method comprises the following steps of: operating master control software; dividing a whole evaluation process into two parts, namely a control system efficiency evaluation process and an evaluation confirmation process, by performance evaluation software; and obtaining data, which is needed by control system efficiency evaluation, by the control system efficiency evaluation process through three steps. The simulation and verification method of the control method of the near space aircraft is mainly applied to simulation and verification in the field of aerospace.
Owner:TIANJIN UNIV

Shared secret establishment

A method for a first entity and a second entity to establish a shared secret, wherein the first entity and the second entity each have a respective asymmetric key pair that comprises a public key and a corresponding private key, wherein the method comprises: the first entity generating a protected item of software that comprises a representation of the public key of the first entity and a message generator that is configured to use an authentication key; the first entity providing the protected item of software to the second entity; the second entity executing the protected item of software, said executing comprising the message generator generating a message that represents the public key of the second entity and that comprises authentication data generated using the authentication key so that integrity of the message is verifiable using a verification key corresponding to the authentication key; the first entity obtaining the message from the second entity; in response to a set of one or more conditions being satisfied, the first entity and the second entity together performing shared secret establishment to establish the secret, wherein performing the shared secret establishment comprises the first entity using the public key of the second entity as represented in the message and the second entity using the public key of the first entity as represented in the protected item of software, wherein one of the conditions is performance by the first entity of a successful verification of the integrity of the message using the verification key.
Owner:IRDETO ACCESS

Automatic construction and uploading method and device for application program, computer equipment and storage medium

The invention belongs to the field of computers, and relates to an automatic construction and uploading method and a device for an application program, computer equipment and a storage medium. The method comprises the steps of receiving an application program construction uploading request; acquiring a program code file according to the application program construction uploading request and transmitting the program code file to a program construction directory; acquiring program construction configuration information matched with the category of the application construction uploading request,and compiling a program code file according to the program construction configuration information to generate a compiled file; packaging the compiled file to generate a package file to be uploaded; and signing and verifying the package file, and uploading the package file to a target software platform after the package file passes the verification, thereby finishing automatic construction and uploading of the application program. According to the method provided by the invention, the links of code acquisition, compiling construction, uploading review and the like are connected in series and integrated together, operation is carried out in an automatic mode, continuous integration can be accessed, the application program construction time can be greatly saved, and the working efficiency isimproved.
Owner:CHINA PING AN PROPERTY INSURANCE CO LTD

Flow method for automatically verifying correctness of electric rule file

The invention discloses a method for automatically generating a device test vector and a schematic diagram net list corresponding to the device test vector and automatically performing consistency check and error analysis of a layout and a schematic diagram, namely an optimization method for increasing the verification efficiency of an electric rule file in an integrated circuit aided design software tool, and belongs to the field of the consistency verification of the layout and the schematic diagram in the integrated circuit aided design software tool. The conventional manual layout drawing, schematic diagram test vector, one-by-one net list extraction and one-by-one manual verification of the correctness of the electric rule file have large flow workload and long development time and require that engineers have better design capacity and integrally master the verification flow of a process rule file better, so that the design threshold is high, and the development period is long. The invention provides a flow method for automatically verifying the correctness of the electric rule file. Compared with the conventional manual drawing, comparison and result analysis flows in the industry, the method is easy to operate, the development efficiency is greatly increased, and subsequent frequent amendment and maintenance are facilitated.
Owner:MIRCOSCAPE TECH

Logic design segmentation method and system

The embodiment of the invention provides a logic design segmentation method and system, and belongs to the technical field of logic array prototype system verification, and the method specifically comprises the steps: collecting an RTL design file for describing a logic circuit; performing grammatical analysis processing on the RTL design file, extracting an always object and an assign object in the logic model object, respectively packaging, constructing and generating a hypergraph data structure, performing attribute analysis, processing according to the clock domain information to obtain operation frequency information, and performing associated storage on the clock domain information domain and the operation frequency information and corresponding nodes; and performing segmentation processing to obtain corresponding grouped data. By means of the processing scheme, other processing at the back end of the process is not affected, the segmentation duration is shortened, the segmentation efficiency is improved, meanwhile, efficient, reasonable and correct segmentation processing is conducted on the chip design logic content, the performance and efficiency of design segmentation aregreatly improved, then the process of user front-end function verification is accelerated, and the appearance of integrated circuit products is accelerated.
Owner:S2C
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products