This paper describes an EDA (
Electronic Data Automation) method and
computer software invention for
connectivity verification of IC
mask Layout database versus IC
Schematic; LVS Check (LVS: IC
Layout versus IC
Schematic) over
the internet. The technique takes
advantage of a unique
algorithm to check the
mask layout database connectivity, compare it with its corresponding
schematic diagram for any mismatches in the
mask layout polygons connections. The input of the tool is a mask
layout database blocks (i.e.: IC layout) that were made manually and / or automatically using synthesized tools. These blocks may have some
connectivity mismatches that need to be fixed in order to match the corresponding
integrated circuit (IC)
schematic diagrams. The output of the
software tool is a text based descriptive log file and errors markers pointers that may be read into the mask layout database in order to point any connectivity mismatches of the mask layout database, comparing it to its corresponding
schematic diagram. The end result is a mask layout set of markers and a text format log file that describes any mismatched connections in the mask layout database, comparing it to its corresponded schematic diagram. The
software performs on individual mask layout blocks and / or on hierarchical structure of mask layout blocks. The
system works hierarchically and / or flat.
System also checks mask layout database incrementally, means only blocks that have been changed are checked. The
system can be run via
the internet using our secured protocol. The
system offer a web based control panel to execute all necessary setups for submitting LVS check over
the internet. The system offers the option to run on a
local machine (user's computer) or on the main
server over the internet. (Inventor's computer) The system also offers a PDA (Personal Digital Assistant) interface to launch LVS runs via industry's standard PDA's. The procedure is fully secured by 128 bit security protocol. All necessary file including mask layout GDSII (or GDSIII) file,
netlist and technology file are securely encrypted using 128 bit protocol and send to the remote
server. These files are decrypted and submitted for LVS check on the remote servers. The main remote
server is distributing the task among other computer system for advanced
parallel processing to achieve fast results. All results log files are encrypted using 128 bit security protocol and available for download by the user. In case of local LVS check the results files are available on the user's
local machine.