SOFTWARE ELECTRONIC DESIGN AUTOMATION

Brand Owner (click to sort) Address Description
DELAYMILL SYNOPSYS, INC. 690 East Middlefield Road Mountain View CA 94043 software for electronic design automation;DELAY MILL;
GALAXY CUSTOM DESIGNER SYNOPSYS, INC. 690 East Middlefield Road Mountain View CA 94043 Software for electronic design automation and integrated circuit design;CUSTOM DESIGNER;
PROPOWER ARM LIMITED 110 Fulbourn Road Cambridge CB19NJ United Kingdom Software for electronic design automation and design verification for use in semiconductor manufacturing and testing; computer software for testing of semiconductor devices and parts thereof;PRO POWER;
PROPOWER Prolific, Inc. 39899 Balentine DriveSuite 380 Newark CA 94560 Software for electronic design automation and design verification for use in semiconductor manufacturing and testing; computer software for testing of semiconductor devices and parts thereof;PRO POWER;
VECTORLESS DYNAMIC Apache Design Solutions, Inc. 2645 Zanker Road, Suite 200 San Jose CA 95134 software for electronic design automation; computer software for integrated circuit design; computer software for use in physical analysis of computer chips;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Described herein are methods and systems for secure exchange of information related to electronic design automation. Information deemed sensitive and otherwise worthy of protection may be secured by methods such as encryption, obfuscation and other security measures. The secured information may be provided to an electronic design automation tool for processing without revealing at least some of the secured information. For instance, rule files related to integrated circuit manufacturability may be selectively annotated to indicate portions thereof deserving of protection. An encryption tool may be used to secure the information so indicated and generate a file comprising secured information related to electronic design automation. An electronic design automation tool may then unlock and use the secured information without revealing the same. For instance, the tool may be a physical verification tool capable of verifying whether any of the one or more integrated circuit layouts may violate one or more of the secured rules. An error report may be generated without revealing the secured rules.