Patents by Inventor Diego Martin

Diego Martin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150348347
    Abstract: A multi-functional active container (e.g., luggage or suitcase) with a plurality of sensors and actuators is described. The container may include a body defining an enclosure and having at least one opening. The container may include a processor, a wireless receiver, and an electronically controllable lock. The processor can selectively lock or unlock the electronically controllable lock based on signals received via a wireless receiver (e.g., via Wi-Fi or BLUETOOTH connections). In some examples, a distance between the active container and a remote device (e.g., a smart phone) can be determined (e.g., based on relative GPS signals or connection strength) and if the distance exceeds a threshold, the electronically controllable lock can be activated to secure the container. Further, the container may include a rechargeable power source for powering external devices and an integrated weight sensor for detecting the weight of the container.
    Type: Application
    Filed: May 27, 2015
    Publication date: December 3, 2015
    Inventors: Martin DIZ, Brian CHEN, Alejo VERLINI, Alejandro SARRA, Diego Martin SAEZ-GIL, Tomas Mario PIERUCCI
  • Patent number: 8484738
    Abstract: A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for penetration testing of a target by: receiving at least one confirmed vulnerability of the target; receiving a method for compromising the confirmed vulnerability of the target; installing a network agent on the target in accordance with the method, wherein the network agent allows a penetration tester to execute arbitrary operating system commands on the target; and executing the arbitrary operating system commands on the target to analyze risk to which the target may be exposed.
    Type: Grant
    Filed: March 6, 2008
    Date of Patent: July 9, 2013
    Assignee: Core SDI Incorporated
    Inventors: Alberto Gustavo Soliño Testa, Gerardo Gabriel Richarte, Fernando Federico Russ, Diego Martin Kelyacoubian, Ariel Futoransky, Diego Bartolome Tiscornia, Ariel Waissbein, Hector Adrian Manrique, Javier Ricardo De Acha Campos, Eduardo Arias, Sebastian Pablo Cufre, Axel Elián Brzostowski
  • Publication number: 20130030937
    Abstract: A method and system in which a profile associated with a profile owner is created, wherein at least a portion of the profile is not publicly accessible. A service request associated with the profile is created. A clearance request is received from a vendor, the clearance request containing clearance request data. The clearance request data is transmitted to the profile owner. A response associated with the clearance request data is received from the profile owner. The vendor is permitted to access the portion of the profile that is not publicly accessible when the response grants access permission to the vendor; and the vendor is restricted from access to the portion of the profile that is not publicly accessible when the response denies access permission to the vendor.
    Type: Application
    Filed: June 28, 2012
    Publication date: January 31, 2013
    Applicant: VENTUMAR S.A.
    Inventors: Constancio LARGUIA, Carlos Gustavo MASLATÓN, Sebastian Matias BELLORA, Agustina COMELLI, Diego Martin GONZALEZ, Sebastian SISELES, Pablo LARGUIA
  • Publication number: 20080263671
    Abstract: A system and method provide application penetration testing. The system contains logic configured to find at least one vulnerability in the application so as to gain access to data associated with the application, logic configured to confirm the vulnerability and determine if the application can be compromised, and logic configured to compromise and analyze the application by extracting or manipulating data from a database associated with the application. In addition, the method provides for penetration testing of a target by: receiving at least one confirmed vulnerability of the target; receiving a method for compromising the confirmed vulnerability of the target; installing a network agent on the target in accordance with the method, wherein the network agent allows a penetration tester to execute arbitrary operating system commands on the target; and executing the arbitrary operating system commands on the target to analyze risk to which the target may be exposed.
    Type: Application
    Filed: March 6, 2008
    Publication date: October 23, 2008
    Applicant: Core SDI, Incorporated
    Inventors: Alberto Gustavo Solino Testa, Gerardo Gabriel Richarte, Fernando Federico Russ, Diego Martin Kelyacoubian, Ariel Futoransky, Diego Bartolome Tiscornia, Ariel Waissbein, Hector Adrian Manrique, Javier Ricardo De Acha Campos, Eduardo Arias, Sebastian Pablo Cufre, Axel Elian Brzostowski