throbber

`
`David Moshe Goldschlag, PhD
`
`12018 Auth Lane, Silver Spring, Maryland, 20902, USA
`
`+1.202.525.6661
`
`david@goldschlag.com
`
`
`
`An experienced business and technology executive, with exceptional strategic, analytical,
`technical, and communication skills. Excels at collaboratively determining what is core,
`building the shared narrative that helps teams succeed, and executing to meet goals.
`
`Strategic corporate activities, including corporate and product strategy, strategic sales,
`corporate development, OEM relationships, and IP prosecution and litigation.
`
`Broad and deep technology expertise, including mobile, enterprise security, compliance
`and risk management, digital rights management, cryptography, security, storage,
`enterprise software, and SaaS.
`
`Brings to the organization a focus on a compelling strategy combined with effective
`performance, along with tremendous optimism, energy, creativity, and leadership.
`
`New Edge Labs, Inc
`
`2017 -
`CEO
`• Strategy, Selling, Partnering, IP
`New Edge is a stealth startup that helps enterprises use the cloud securely.
`
`Mountain View, CA
`
`Address
`
`Qualifications
`
`Professional experience
`
`Pulse Secure, LLC
`
`2014 -
`SVP Strategy & CTO
`• Corporate Strategy, Corporate Development, Strategic Architecture, IP
`Pulse Secure is a leader in secure remote access for the enterprise, enabling users to access
`any service from any device.
`
`San Jose, CA
`
`MobileSpaces (Cellsec, Inc)
`
`2011 - 2014
`CEO
`• Strategy, Partnering, Selling, IP
`My focus at MobileSpaces is to build the company that enables BYOD for enterprise
`mobility.
`MobileSpaces was acquired by Pulse Secure in October 2014.
`
`Silver Spring, MD
`
`McAfee, Inc
`
`McLean, VA
`
`2010 - 2011
`VP Mobile
`• Strategy
`• Strategic Selling
`• Partners
`• IP and Patents
`
` 1
`
`IV 2005
`Unified Patents v. IV
`IPR2016-01404
`
`

`

`
`
`My focus at McAfee is to build a unified consumer and enterprise mobile security offering
`that leverage McAfee’s strengths into the new mobile world.
`
`McLean, VA
`
`Trust Digital, Inc
`
`2006 - 2010
`President & CTO
`• Marketing, Engineering, QA, and Support
`• IP and Patents
`• DOD / NSA Certifications
`• Strategic Partners and Accounts
`My focus at Trust Digital is to build the company that enables enterprises and government
`to make employee’s smartphones a secure part of their corporate network.
`Trust Digital was acquired by McAfee in April 2010.
`
`2004 - 2006
`
`Trusted Edge, Inc.
`
`McLean, VA
`
`SVP & CTO
`• Corporate Strategy: Markets, Products, Partners, and Acquisitions
`• Product Roadmap
`• OEMs & Partners: Symantec, OpenText, and IBM
`• IP and Patents
`• Strategic Accounts
`My focus at Trusted Edge was to enable enterprises to improve compliance and reduce risk
`by having visibility and control over information created and used at the network’s edge.
`Trusted Edge sold direct and through OEM channels. Trusted Edge was acquired by
`FileTek in 2007.
`
`2002 - 2004
`Consultant
`• Security & Cryptography
`• Digital Rights Management, Networked Storage, IT hosting, Embedded Systems
`• Strategy & Planning; Architecture & Design; Review & Due Diligence; Standards
`Work; IP Prosecution & Litigation
`
`Silver Spring, MD
`
`2002 – 2003
`
`KeySec Software
`
`Silver Spring, MD
`
`Founder
`• Corporate Strategy and Business Model
`• Intellectual property and product architecture
`• Marketing to both OEM and end-customers
`• Financing
`KeySec Software develops and markets policy management and access-control solutions
`for networked storage. KeySec enables enterprises to better leverage their SAN
`infrastructure investment through software.
`
`
`2001 - 2003
`Board of Advisors
`• Corporate Strategy and Business Model
`•
`Intellectual Property, technology, and security architecture
`• Marketing to both studio and technology partners
`• Financing
`
`
`
`Herndon, VA
`
`
`
`Cinea, Inc.
`
`
`
` 2
`
`

`

`
`
`Cinea develops and markets digital content protection technologies for cinema. Cinea is
`enabling the movie industry’s transition to digital distribution and projection.
`
`1999 - 2001
`
`USinternetworking, Inc.
`
`Annapolis, MD
`
`Chief Technology Officer
`• Strategy: Corporate direction and roadmap
`• Architecture: The context within which USi’s infrastructure, products, services, and
`processes operate
`• Operational: Responsible for the productization, design, engineering, deployment, and
`support of USi’s communication services, security and disaster recovery products, and
`management and monitoring infrastructure
`• Quality: Vulnerabilities, metrics, operational trends, design reviews
`• Communication: Positioning the company for clients, industry, and financial analysts
`My focus at USi was threefold: inverting the Application Service Provider (ASP)
`operational concept from a collection of many client data centers under one roof to a single
`data center supporting many clients; introducing provisioning as a key competency of
`ASPs, in addition to the existing competencies of application management and support;
`and building the next generation telco from the synergy of bandwidth, storage, and
`computation.
`
`1997 - 1999
`
`Divx
`
`Herndon, VA
`
`Manager, Security Systems
`• Lead design, development, and production of Divx’s second generation conditional
`access infrastructure.
`• Active in industry working groups on conditional access for high-definition television,
`copy protection for broadcast and cable TV, and secure digital music.
`My focus at Divx was to develop an economically sound architecture for securing digital
`entertainment content. We designed a system that made it unprofitable for a pirate to
`leverage Divx’s distribution channels, media, and customer devices to compete with
`Divx’s value proposition to movie consumers and studios.
`
`1993 - 1997
`
`Naval Research Laboratory
`
`Washington, D.C.
`
`Computer Scientist
`• Developed enabling technologies for e-commerce analogs of standard business models
`and new types of transactions, with increased security and privacy.
`• Designed “Onion Routing” (now called Tor), a system for anonymous communication
`over the Internet. The anonymous connections protect identity and location, in addition
`to transmitted data.
`• Developed security architectures that minimize trusted components.
`• Research in security and privacy.
`
`1991 - 1993
`
`National Security Agency
`
` Fort Meade, Maryland
`
`Computer Scientist
`• Responsible for introducing formal methods to Agency developments.
`
`1987 - 1991
`
`Computational Logic, Inc.
`
`Austin, Texas
`
`Computing Research Scientist
`
` 3
`
`

`

`
`
`• Research in formal analysis of concurrent systems.
`
`1986 - 1987
`
`ICSCA, University of Texas
`
`Austin, Texas
`
`Research Assistant
`• Research in automated theorem proving.
`
`1984 - 1985
`
`
`Software Services Corporation
`Ford Motor Company
`
`Detroit, Michigan
`
`Programmer
`• Developed and maintained systems for analyzing and reporting vehicle test results.
`
`Awards received
`
`Alan S. Berman Award at the Naval Research Laboratory, 1999.
`
`Outstanding Paper Award at the 11th Annual Computer Security Applications
`Conference, December 1995.
`
`MCD Fellowship at the University of Texas at Austin, 9/85-5/86.
`
`Merit Scholar at Wayne State University, Detroit, Michigan, 9/82-4/85.
`
`Education
`
`1985 - 1992
`
`University of Texas at Austin
`
`Austin, Texas
`
`Ph.D. Computer Science
`• Dissertation: Mechanically Verifying Concurrent Programs
`
`1982 - 1985
`
`Wayne State University
`
`Detroit, Michigan
`
`B.S. in Computer Science with a second major in Mathematics
`
`Board of Advisors
`
`ClassifEye, 2007- 2008
`
`Zenoss, 2006 - 2007
`
`Trust Digital, 2005 - 2006
`
`Cinea, 2001-2003
`
`MyWebOS.com, 2000-2002
`
`Patents
`
`System and Method for Controlling Mobile Device Access to a Network, United States
`#8,750,108, 6/10/2014 (with N. Laudermilch, W. Supernor, R. Boroday)
`
`Mobile Risk Assessment, United States #8,677,497, 3/18/2014 (with P. Ganapathi
`Basavapatna, S. Kumar Gaddala, and S. Schrecker)
`
` 4
`
`

`

`
`
`System, method, and device for mediating connections between policy source servers,
`corporate repositories, and mobile devices, United States #8,565,726 B2, 10/22/2013,
`(with K. Sapp and D. Walker)
`
`System, method, and device for mediating connections between policy source servers,
`corporate repositories, and mobile devices, United States #8,528,042 B2, 9/3/2013, (with
`K. Sapp and D. Walker).
`
`Local Content Security System, United States, #7,277,544 B1, 10/2/2007, (with R. Eye, T.
`Siner, J. Segal, R. Schumann).
`
`Digital Content Distribution System and Method, United States, #7,162,642 B2,
`1/9/2007, (with R. Schumann, R. Whittemore, D. Kravtiz, S. Iu, G. Mercier, M. Bergeron,
`J. Ehrhardt, and R. Vitkus).
`
`Hierarchical Key Management, United States #6,975,728 B1, 12/13/2005, (with R. Eye
`and D. Kravitz).
`
`Manufacturing Trusted Devices, United States #6,957,344, 10/18/2005, (with D. Kravitz).
`
`Key Management Encoding and Decoding, United States #6,907,127, 6/14/2005, (with D.
`Kravitz).
`
`Conditional Access via Secure Logging with Simplified Key Management, United States
`Patent #6,738,905 (with D. Kravitz).
`
`Onion Routing Network for Securely Moving Data through Communication Networks,
`United States Patent #6,266,704, 7/24/2001 (with M. Reed and P. Syverson).
`
`System and Method for Electronic Transactions, United States Patent #6,108,644 (with S.
`Stubblebine and P. Syverson).
`
`Publications
`
`Publications
`
`
`34 Publications
`
` 5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket