Technology validation and ownership
First Claim
Patent Images
1. A method comprising:
- receiving one or more proprietary files from a vendor;
generating, by a signature generator embedded in one or more electronic design automation (EDA) tools, one or more signatures, wherein a signature corresponds to a segment of a proprietary file of the one or more proprietary files, wherein the proprietary file of the one or more proprietary files comprises hardware description language code;
validating each of the signatures to ensure that the signatures are owned by the vendor;
comparing a signature of the one or more signatures with existing signatures;
in response to determining that the signature is not unique and a conflict exists within the vendor based on the comparison, storing a relation between the signature and an existing signature, wherein the relation reflects an ownership relationship between the proprietary file and the vendor;
identifying, in response to determining that the signature is not unique, at least one of leakage, misappropriation, appropriation, or contamination of the one or more proprietary files with one or more of proprietary files from another vendor, and open source files.
2 Assignments
0 Petitions
Accused Products
Abstract
A method comprising receiving a plurality of signatures representing one or more proprietary files from a vendor generated without disclosure of the proprietary files, each signature corresponding to a segment of a proprietary file. The method further comprising and validating each of the plurality of the signatures, to ensure that the signatures are the proprietary code of the vendor. The method further comprises adding the plurality of the signatures to a global database, the global database used to compare the proprietary data of the vendor to other technology data and taking various action based on the results of the comparison.
18 Citations
20 Claims
-
1. A method comprising:
-
receiving one or more proprietary files from a vendor; generating, by a signature generator embedded in one or more electronic design automation (EDA) tools, one or more signatures, wherein a signature corresponds to a segment of a proprietary file of the one or more proprietary files, wherein the proprietary file of the one or more proprietary files comprises hardware description language code; validating each of the signatures to ensure that the signatures are owned by the vendor; comparing a signature of the one or more signatures with existing signatures; in response to determining that the signature is not unique and a conflict exists within the vendor based on the comparison, storing a relation between the signature and an existing signature, wherein the relation reflects an ownership relationship between the proprietary file and the vendor; identifying, in response to determining that the signature is not unique, at least one of leakage, misappropriation, appropriation, or contamination of the one or more proprietary files with one or more of proprietary files from another vendor, and open source files. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A technology and ownership validation system comprising:
-
a signature generator embedded in one or more electronic design automation (EDA) tools, the signature generator configured to generate one or more signatures corresponding to one or more proprietary files received from a vendor; a signature validator configured to receive the one or more signatures, wherein each signature corresponds to a segment of a proprietary file of the one or more proprietary files, wherein the proprietary file of one or more proprietary files comprises hardware description language code, wherein the signature validator is further configured to compare a signature of the one or more signatures with existing signatures and validate each of the signatures to ensure that the signatures are owned by the vendor; in response to determining that the signature is not unique and a conflict exists within the vendor based on the comparison, storing a relation between the signature and an existing signature, wherein the relation reflects an ownership relationship between the proprietary file and the vendor; and a memory including a global database to store the signatures, the global database used to compare the proprietary files of the vendor to other technology data and identify, in response to determining that the signature is not unique, at least one of leakage, misappropriation, appropriation, or contamination of the one or more proprietary files with one or more of proprietary files from another vendor, and open source files. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system to provide technology and ownership validation of files, the system comprising:
a processing device configured to execute; one or more electronic design automation (EDA) tools available to a vendor as a vendor system configured to enable a vendor to generate unique signatures locally for proprietary files, without disclosing the proprietary files to another, wherein a proprietary file of the one or more proprietary files comprises hardware description language code; and a signature validator configured to receive the unique signatures from the tool, compare a signature of the plurality of signatures with existing signatures and validate each of the plurality of signatures to ensure that the signatures are owned by the vendor, in response to determining that the signature is not unique and a conflict exists within the vendor based on the comparison, storing a relation between the signature and an existing signature, wherein the relation reflects an ownership relationship between the proprietary file and the vendor; and a memory coupled to the processing device, the memory comprising a global database to store the unique signatures and metadata, the global database used to identify, in response to determining that the signature is not unique, at least one of leakage, misappropriation, appropriation, or contamination of the proprietary files with one or more of proprietary files from another vendor, and open source files. - View Dependent Claims (20)
Specification