Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

2930 results about "Verification" patented technology

Verification in the field of space systems engineering covers two verification processes: Qualification and Acceptance

Construction verification method and device capable of verifying security two-dimensional code offline

Embodiments of the invention provide a construction verification method and device capable of verifying a security two-dimensional code offline. The method comprises the following steps of inputting information that needs coding and type information, carrying out digital signature operation and encryption operation on the input information according to an information release type, constructing combination information, and encoding to generate a security two-dimensional code which can be verified off-line according to a two-dimensional code coding rule; inputting the information of the security two-dimensional code and identifying included combination information and type information, analyzing and decoding the combination information to obtain independent sub-information according to the type information of the two-dimensional code, and verifying digital certificate effectiveness information, a digital signature of the input information and an effective time limit of the input information; and if all verifications pass, showing that the offline verification of the security two-dimensional code is correct and the coding information source of the security two-dimensional code is credible, otherwise showing that the information release source of the security two-dimensional code is incredible. The method and the device have the beneficial effects that the security two-dimensional code cannot be tampered, counterfeited and denied, the public or private information can be released, and the integrity of the information of the security two-dimensional code and the authenticity of the source can be verified offline without a network connection.
Owner:王栋

Method and device for installing application software

The invention discloses a method for installing application software. The method includes acquiring signature information carried by an installation program; utilizing prestored original signature information of an installation program of the application software to verify the signature information carried by the installation program, and if a verification result is unsuccessful, exiting installation of the application software; if the verification result is successful, executing an executable code of the installation program. The invention further discloses a device for installing the application software. By the method and the system, a tampered installation program can be effectively recognized, so that the application software which is maliciously modified is effectively avoided from being installed in an operation system.
Owner:BEIJING SAMSUNG TELECOM R&D CENT +1

Method for the static analysis of concurrent multi-threaded software

A method for the static analysis of concurrent multi-threaded software which bypasses the state explosion situation that plagues the prior art, thereby making our method scalable while—at the same time—producing no loss in precision. Our inventive method maintains patterns of lock acquisition and lock release by individual threads by constructing augmented versions of the threads. Once the augmented versions have been constructed, our inventive method verifies the concurrent program using existing tools for the verification of sequential programs—thereby greatly reducing implementation overhead. Finally, our inventive augmentation and method is carried out in an automatic manner—without requiring user intervention.
Owner:NEC CORP

Production line design and optimization method based on digital twinning

The invention relates to a production line design and optimization method based on digital twinning. The production line design and optimization method comprises the following steps: performing digital process design on a product, integrally planning a production line, constructing and integrating a digital twinning model of the production line, performing simulation verification on a virtual production line, constructing and implementing a physical production line, and performing virtual-real mapping and optimization on the production lines. According to the invention, the digital twinning model is constructed according to three levels of elements, behaviors and rules, and has production line evaluation, evolution and reasoning capabilities; a virtual production line model is established,virtual debugging and simulation operation of the virtual production line are achieved, the production line does not need to be constructed firstly, design risks are avoided, and debugging time is saved; and a virtual-real mapping relationship and an interaction mechanism between the virtual production line and the physical production line are established, statistical analysis is performed on theoperation data of the virtual production line, and optimization and management and control on the physical production line are realized.
Owner:SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI

A validation method and system based on heterogeneous network

The invention discloses a validation method and a system based on a heterogeneous network, comprising the steps that: a log server receives a unique label of a client; the log server and the client interactively determine second network information for transmitting a verification code by a first network; the log server sends a verification code notification massage to a notice server, the notification server sends the verification code to the client by a second network according to the verification code notification massage; the log server saves the verification code; the client sends a confirmation request including a unique label and a verification code to the log server by the first network; the log server verifies the unique label in the confirmation request, matches the unique label in the confirmation request with the unique label in the verification request, as well as matches the verification code in the confirmation request with the saved verification code. The validation method and the system based on the heterogeneous network improve the convenience and flexibility of a validation process based on the heterogeneous network.
Owner:LENOVO (BEIJING) CO LTD

Reliable firmware upgrading realizing method for distributed control system

The invention provides a reliable firmware upgrading realizing method applied to a distributed control system. The reliable firmware upgrading realizing method enables any controller nodes or a host in the system to have program upgrading capacity, greatly improves the expansion capacity of hardware equipment and the customizing performance of the system and reduces later maintenance and upgrading cost. The reliable firmware upgrading realizing method is different from a traditional method in that receiving of a target program package is realized in an application program, the received data package is stored into a backup program area at first, after the target program package is completely received and CRC verification is passed, parameter information marks are generated in an IAP mark area, and a Boot loader is called for to realize program upgrading. Even if an unpredictable failure occurs in any link, existing programs cannot be replaced, and therefore the stability of the system is greatly improved.
Owner:南京润教科技有限公司

Bar-code-based information verification system

The invention discloses a bar-code-based information verification system. The information verification system comprises a bar code, a database subsystem, a management subsystem, a server cluster, a fixed terminal and a mobile terminal, wherein the bar code is used for identifying and encoding a product and comprises encrypted product information; the database subsystem is used for storing bar code information and the position information of the terminals; the management subsystem is used for information management and operation maintenance; the server cluster is used for providing support for verification service; the fixed terminal is used for reading the bar code information and sending the bar code information to the server cluster for processing; and the mobile terminal is used for real-time anti-counterfeiting verification. The bar-code-based information verification system has the advantages that (1) system safety is improved by using a dynamic encryption algorithm; (2) the response speed and throughput of the system are increased by using the server cluster; (3) data safety is improved by data backup; and (4) the improved bar code design is suitable for the anti-counterfeiting traceability of commodity.
Owner:广州众码汇信息科技有限公司

System and method for verifying computer program correctness and providing recoverable execution trace information

In a system for statically analyzing a specified computer, a verification condition generator converts the program into a logical equation, called a verification condition, and inserts program flow control labels into the sub-equations of the verification condition. The flow control labels identify conditional branch points in the specified computer program. A theorem prover is applied to the logical equation to determine truth of the logical equation, and when the truth of the logical equation cannot be proved, the theorem prover generates at least one counter-example identifying one of the conditions, one or more variable values inconsistent with that condition, and any of the flow control labels for conditional branch points of the program associated with the identified variable values. A post processing module converts each counter-example into an error message that includes a program trace when the counter-example identifies one or more of the flow control labels.
Owner:HEWLETT PACKARD DEV CO LP

Software upgrading bag packaging method and software upgrading method

The invention relates to a technique for safely updating a software and provides a software update packet packaging method for ensuring the legality and completeness of an updated software, as well as a software updating method. Digital certificates of trustworthy authentication institutes are prearranged in a terminal apparatus, or a server is used for determining the trustworthy authentication institutes; the authentication institutes respectively perform digital signing to the software and transmit an original cleartext software together with all digital signatures and digital certificates to the terminal apparatus; the terminal apparatus verifies whether all digital certificates are legal and judges the authentication institutes working together for updating the software; if all conditions are satisfied, the terminal apparatus verifies all digital signatures and then updates the software after the verification. As the legality of a software update packet is verified according to the digital certificates of the authentication institutes, the completeness of the software update packet is verified according to the digital signatures of the authentication institutes and a plurality of parties participate the concerted signing to the software, the safe update of the software is ensured.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Installing verification method for intelligent terminal application program and system

The invention discloses an installing verification method for an intelligent terminal application program. The method comprises the following steps: acquiring a first public key pre-stored in an intelligent terminal system layer; judging if a to-be-installed application program meets an installing condition according to the pre-stored first public key; if yes, allowing to install the to-be-installed application program; if not, forbidding the installing for the to-be-installed application program. The invention also provides a system for realizing the method. According to the installing verification method for the intelligent terminal application program provided by the invention, before the application program is installed, the pre-stored first public key of the system layer is utilized to judge if the application program meets the installing condition, and the application program can be installed when the installing condition is met, so that the application program on the terminal equipment being an authenticated legal program can be ensured; the installing for an illegal application program can be effectively prevented; the manageable and controllable terminal application can be ensured; the illegal entry and spreading of harmful information can be prevented; the benefits of operators and users can be protected.
Owner:北京视博数字电视科技有限公司

Method, system and computer program for automated hardware design debugging

The present invention provides a method, system and computer program for automated debugging for pre-fabricated digital synchronous hardware designs implemented in Hardware Description Language (HDL). Required information is captured by interacting with the verification environment after verification fails. This capture information is used to build a diagnosis problem where the solution is a set of logic level error sources. Using the HDL information, the error at the logic level is translated to gates, modules, statements, and signals in the HDL description. The diagnosis problem can be solved efficiently formulating a Quantified Boolean Formula (QBF) problem and also by using the hierarchical and modular nature of the HDL design during diagnosis.
Owner:VENERIS ANDREAS +3

Software simulation verification method based on Cache coherence protocol

The invention provides a software simulation verification method based on a Cache coherence protocol. According to the method, pseudo random test which is capable of compiling constraint models and also carrying out band constraint in a manual mode is subject to software simulation and verification; specific objects are verified, and the accuracy and defect of the protocols are fed back. The method based on software simulation comprises the following steps of: firstly determining a multi-stage coherence description mode based on an expanded Cache Coherence protocol; and subsequently realizing the software simulation verification method, counting the coverage rate and carrying out error report. With the adoption of the method, the Cache Coherence protocol in multi-stage domains in a multi-state space can be verified effectively so as to enable a protocol table to realize the establishment of corresponding logic relationship, judge whether the state transition of a system in accordance with the protocol table accords with the coherence definition through an overall checker, and primarily judge whether a mode established in accordance with the protocol table has expected properties. The model system has the remarkable advantages that counter-examples can be generated automatically so as to assist in debugging errors of the system and accelerating system diagnosis and debugging.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Software updating apparatus, software updating system, alteration verification method and alteration verification program

To aim provide a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server (200), a replacement protection control module (121) to be used for updating a protection control module (120) having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations.
Owner:PANASONIC CORP

Verification code input method and device

The invention provides a verification code input method and device, and the method comprises the steps: reading a short message; judging whether the short message is matched with a target application which needs to receive a verification code or not when the short message contains the verification code; enabling the verification code in the short message to be filled in a system paste board when the short message is matched with the target application, and adding privacy authority, wherein the privacy authority is used for shielding other applications different from the target application; and enabling the verification code in the system paste board to be filled in a verification input frame of the target application. In conclusion, the method can automatically analyzes the verification code, matched with the target application which needs to receive the verification code, from the content of the short message, and fills the verification code into the corresponding verification input frame. A user does not need to specially search the verification code from the short message, so the method and device are relatively simple in operation. In addition, the method adds privacy authority to the content of the system paste board, thereby preventing the leakage of the privacy of the user.
Owner:XIAOMI INC

Simulation and verification method of control method of near space aircraft

The invention relates to the simulation and the verification of a control method in the field of aerospace. In order to provide a simulation and verification platform capable of supporting a near space aircraft to real-time simulation tests and performance evaluation from the design of a flight control system, the technical scheme adopted by the invention is as follows: a simulation and verification method of the control method of the near space aircraft is realized by virtue of the following devices: a simulation master control machine and a dSPACE real-time simulation machine, wherein the simulation master control machine is provided with a DS817 high-speed serial communication interface plate; and the simulation master control machine is communicated with the DS814 high-speed serial communication interface plate of the dSPACE real-time simulation machine through an optical fiber. The method comprises the following steps of: operating master control software; dividing a whole evaluation process into two parts, namely a control system efficiency evaluation process and an evaluation confirmation process, by performance evaluation software; and obtaining data, which is needed by control system efficiency evaluation, by the control system efficiency evaluation process through three steps. The simulation and verification method of the control method of the near space aircraft is mainly applied to simulation and verification in the field of aerospace.
Owner:TIANJIN UNIV

Operation system specification formal verification and test method

The invention discloses an operation system specification formal verification and test method. The method comprises the steps of firstly extracting constraints of pre-conditions and post-conditions about system service execution in operation system specifications; according to the extracted constraint specifications, building a formal semantic model; verifying the formal semantic model and an operation system application, and if the verification is not passed, correcting the formal semantic model or the operation system application, until the formal semantic model and the operation system application meet the specifications; automatically generating a test case realized by an operation system kernel from the correct formal semantic model by using a model check method; testing the correctness of operation system kernel implementation; and executing the verified application in the formal semantic model and the operation system kernel implementation, extracting two executive tracks, comparing the consistency of the two executive tracks by applying a mutual simulation method, and if the two executive tracks are inconsistent, correcting the operation system kernel implementation until the operation system kernel implementation is correct. The method is applied to formal verification of the operation system specifications and test of the operation system kernel implementation, thereby improving the security and reliability of an operation system.
Owner:EAST CHINA NORMAL UNIVERSITY

Shared secret establishment

A method for a first entity and a second entity to establish a shared secret, wherein the first entity and the second entity each have a respective asymmetric key pair that comprises a public key and a corresponding private key, wherein the method comprises: the first entity generating a protected item of software that comprises a representation of the public key of the first entity and a message generator that is configured to use an authentication key; the first entity providing the protected item of software to the second entity; the second entity executing the protected item of software, said executing comprising the message generator generating a message that represents the public key of the second entity and that comprises authentication data generated using the authentication key so that integrity of the message is verifiable using a verification key corresponding to the authentication key; the first entity obtaining the message from the second entity; in response to a set of one or more conditions being satisfied, the first entity and the second entity together performing shared secret establishment to establish the secret, wherein performing the shared secret establishment comprises the first entity using the public key of the second entity as represented in the message and the second entity using the public key of the first entity as represented in the protected item of software, wherein one of the conditions is performance by the first entity of a successful verification of the integrity of the message using the verification key.
Owner:IRDETO ACCESS

Automatic construction and uploading method and device for application program, computer equipment and storage medium

The invention belongs to the field of computers, and relates to an automatic construction and uploading method and a device for an application program, computer equipment and a storage medium. The method comprises the steps of receiving an application program construction uploading request; acquiring a program code file according to the application program construction uploading request and transmitting the program code file to a program construction directory; acquiring program construction configuration information matched with the category of the application construction uploading request,and compiling a program code file according to the program construction configuration information to generate a compiled file; packaging the compiled file to generate a package file to be uploaded; and signing and verifying the package file, and uploading the package file to a target software platform after the package file passes the verification, thereby finishing automatic construction and uploading of the application program. According to the method provided by the invention, the links of code acquisition, compiling construction, uploading review and the like are connected in series and integrated together, operation is carried out in an automatic mode, continuous integration can be accessed, the application program construction time can be greatly saved, and the working efficiency isimproved.
Owner:CHINA PING AN PROPERTY INSURANCE CO LTD

Flow method for automatically verifying correctness of electric rule file

The invention discloses a method for automatically generating a device test vector and a schematic diagram net list corresponding to the device test vector and automatically performing consistency check and error analysis of a layout and a schematic diagram, namely an optimization method for increasing the verification efficiency of an electric rule file in an integrated circuit aided design software tool, and belongs to the field of the consistency verification of the layout and the schematic diagram in the integrated circuit aided design software tool. The conventional manual layout drawing, schematic diagram test vector, one-by-one net list extraction and one-by-one manual verification of the correctness of the electric rule file have large flow workload and long development time and require that engineers have better design capacity and integrally master the verification flow of a process rule file better, so that the design threshold is high, and the development period is long. The invention provides a flow method for automatically verifying the correctness of the electric rule file. Compared with the conventional manual drawing, comparison and result analysis flows in the industry, the method is easy to operate, the development efficiency is greatly increased, and subsequent frequent amendment and maintenance are facilitated.
Owner:MIRCOSCAPE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products