Patents by Inventor Michail Maniatakos

Michail Maniatakos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11046009
    Abstract: A system for detecting corruption in a three-dimensional model for use in additive manufacturing comprises a non-transitory computer-readable medium with instructions stored thereon, that when executed by a processor, perform the steps of obtaining a set of tool-control language instructions that define an additive manufactured part, obtaining a first mechanical specification for the additive manufactured part, constructing a virtual three dimensional model from the set of tool-control language instructions, performing at least one analysis step on the virtual three dimensional model to determine whether the virtual three dimensional model meets the first mechanical, electrical, thermal, and/or magnetic specification, and indicating that the set of tool-control language instructions is corrupt when the virtual three dimensional model fails to meet the first mechanical, electrical, thermal, and/or magnetic specification. A method of producing an additive manufactured part is also described.
    Type: Grant
    Filed: March 7, 2019
    Date of Patent: June 29, 2021
    Assignee: NEW YORK UNIVERSITY
    Inventors: Nektarios Georgios Tsoutsos, Nikhil Gupta, Michail Maniatakos
  • Publication number: 20190275744
    Abstract: A system for detecting corruption in a three-dimensional model for use in additive manufacturing comprises a non-transitory computer-readable medium with instructions stored thereon, that when executed by a processor, perform the steps of obtaining a set of tool-control language instructions that define an additive manufactured part, obtaining a first mechanical specification for the additive manufactured part, constructing a virtual three dimensional model from the set of tool-control language instructions, performing at least one analysis step on the virtual three dimensional model to determine whether the virtual three dimensional model meets the first mechanical, electrical, thermal, and/or magnetic specification, and indicating that the set of tool-control language instructions is corrupt when the virtual three dimensional model fails to meet the first mechanical, electrical, thermal, and/or magnetic specification. A method of producing an additive manufactured part is also described.
    Type: Application
    Filed: March 7, 2019
    Publication date: September 12, 2019
    Inventors: Nektarios Georgios Tsoutsos, Nikhil Gupta, Michail Maniatakos
  • Patent number: 10079674
    Abstract: A privacy-preserving verification methodology for SoC computing systems is described. The verification methodology utilizes the principles of Multi-Party Computation (“MPC”), and enables meaningful manipulation of encrypted data in the encrypted domain through the use of a fully homomorphic encryption (“FHE”) scheme. In the described verification methodology, IP logic is transformed and test vectors utilized to verify the IP logic are encrypted. The parties involved in the verification (e.g., the designer, the manufacturer, a third-party verification service, etc.) can functionally verify the IP core via the encrypted test vectors while the encrypted test vectors remain in the encrypted domain. Accordingly, the IP core is verified without revealing unwarranted information, such as the underlying IP behind the SoC.
    Type: Grant
    Filed: February 23, 2016
    Date of Patent: September 18, 2018
    Assignee: NEW YORK UNIVERSITY
    Inventors: Michail Maniatakos, Charalambos Konstantinou, Anastasis Keliris
  • Patent number: 9619658
    Abstract: A homomorphically encrypted one instruction computation (“HEROIC”) computing system is described. The described HEROIC cloud computing system utilizes a homomorphic encryption scheme. The homomorphic encryption scheme allows for meaningful manipulation of encrypted data directly within the encrypted domain (i.e., without the need to first decrypt the data and then re-encrypt the data after processing). The HEROIC cloud computing system eliminates the need for the cloud computing processor to first decrypt data prior to processing thereby eliminating the need for the cryptographic keys to be provided to the provider of the cloud computing system.
    Type: Grant
    Filed: January 6, 2015
    Date of Patent: April 11, 2017
    Assignee: New York University
    Inventors: Michail Maniatakos, Nektarios Georgios Tsoutsos
  • Publication number: 20160254912
    Abstract: A privacy-preserving verification methodology for SoC computing systems is described. The verification methodology utilizes the principles of Multi-Party Computation (“MPC”), and enables meaningful manipulation of encrypted data in the encrypted domain through the use of a fully homomorphic encryption (“FHE”) scheme. In the described verification methodology, IP logic is transformed and test vectors utilized to verify the IP logic are encrypted. The parties involved in the verification (e.g., the designer, the manufacturer, a third-party verification service, etc.) can functionally verify the IP core via the encrypted test vectors while the encrypted test vectors remain in the encrypted domain. Accordingly, the IP core is verified without revealing unwarranted information, such as the underlying IP behind the SoC.
    Type: Application
    Filed: February 23, 2016
    Publication date: September 1, 2016
    Applicant: New York University
    Inventors: Michail MANIATAKOS, Charalambos Konstantinou, Anastasis Keliris
  • Publication number: 20150193628
    Abstract: A homomorphically encrypted one instruction computation (“HEROIC”) computing system is described. The described HEROIC cloud computing system utilizes a homomorphic encryption scheme. The homomorphic encryption scheme allows for meaningful manipulation of encrypted data directly within the encrypted domain (i.e., without the need to first decrypt the data and then re-encrypt the data after processing). The HEROIC cloud computing system eliminates the need for the cloud computing processor to first decrypt data prior to processing thereby eliminating the need for the cryptographic keys to be provided to the provider of the cloud computing system.
    Type: Application
    Filed: January 6, 2015
    Publication date: July 9, 2015
    Applicant: NEW YORK UNIVERSITY
    Inventors: Michail Maniatakos, Nektarios Georgios TSOUTSOS