throbber

`
`David Moshe Goldschlag, PhD
`
`12018 Auth Lane, Silver Spring, Maryland, 20902, USA
`+1.202.525.6661
`david@goldschlag.com
`
`An experienced business and technology executive, with exceptional strategic, analytical,
`technical, and communication skills. Excels at collaboratively determining what is core,
`building the shared narrative that helps teams succeed, and executing to meet goals.
`
`Strategic corporate activities, including corporate and product strategy, strategic sales,
`corporate development, OEM relationships, and IP prosecution and litigation.
`
`Broad and deep technology expertise, including mobile, enterprise security, compliance
`and risk management, digital rights management, cryptography, security, storage,
`enterprise software, and SaaS, in a variety of applications including protection of
`sensitive information, management of devices, and asset tracking.
`
`Brings to the organization a focus on a compelling strategy combined with effective
`performance, along with tremendous optimism, energy, creativity, and leadership.
`
`Co-inventor of Onion Routing, now called Tor.
`
`New Edge Labs, Inc
`
`2017 -
`CEO
` Strategy, Selling, Partnering, IP
`New Edge offers enterprises secure Zero Trust access to private applications in the public
`cloud and the datacenter.
`
`Silver Spring, MD
`
`Address
`
`Qualifications
`
`Professional experience
`
`Pulse Secure, LLC
`
`2014 -
`SVP Strategy & CTO
` Corporate Strategy, Corporate Development, Strategic Architecture, IP
`Pulse Secure is a leader in secure remote access for the enterprise, enabling users to
`access any service from any device.
`
`San Jose, CA
`
`MobileSpaces (Cellsec, Inc)
`
`2011 - 2014
`CEO
` Strategy, Partnering, Selling, IP
`My focus at MobileSpaces is to build the company that enables BYOD for enterprise
`mobility.
`MobileSpaces was acquired by Pulse Secure in October 2014.
`
`Silver Spring, MD
`
`2010 - 2011
`VP Mobile
` Strategy
`
`McAfee, Inc
`
`Santa Clara, CA
`
` 1
`
` Ex. 1016
` Apple v. MPH Techs. Oy
` IPR2019-00820
`
`

`

`
`
` Strategic Selling
` Partners
` IP and Patents
`My focus at McAfee is to build a unified consumer and enterprise mobile security
`offering that leverage McAfee’s strengths into the new mobile world.
`
`McLean, VA
`
`Trust Digital, Inc
`
`2006 - 2010
`President & CTO
` Marketing, Engineering, QA, and Support
` IP and Patents
` DOD / NSA Certifications
` Strategic Partners and Accounts
`My focus at Trust Digital is to build the company that enables enterprises and
`government to make mobile devices a secure part of their corporate operations. This
`includes a variety of operational models, including devices for office applications, and
`devices for scanning and tracking inventory in warehouses and managing supply chains.
`Trust Digital was acquired by McAfee in April 2010.
`
`McLean, VA
`
`Trusted Edge, Inc.
`
`2004 - 2006
`SVP & CTO
` Corporate Strategy: Markets, Products, Partners, and Acquisitions
` Product Roadmap
` OEMs & Partners: Symantec, OpenText, and IBM
` IP and Patents
` Strategic Accounts
`My focus at Trusted Edge was to enable enterprises to improve compliance and reduce
`risk by having visibility and control over information created and used at the network’s
`edge. Trusted Edge sold direct and through OEM channels. Trusted Edge was acquired
`by FileTek in 2007.
`
`Consultant
`2002 - 2004
` Security & Cryptography
` Digital Rights Management, Networked Storage, IT hosting, Embedded Systems
` Strategy & Planning; Architecture & Design; Review & Due Diligence; Standards
`Work; IP Prosecution & Litigation
`
`Silver Spring, MD
`
`KeySec Software
`
`Silver Spring, MD
`
`2002 – 2003
`Founder
` Corporate Strategy and Business Model
` Intellectual property and product architecture
` Marketing to both OEM and end-customers
` Financing
`KeySec Software develops and markets policy management and access-control solutions
`for networked storage. KeySec enables enterprises to better leverage their SAN
`infrastructure investment through software.
`
`2001 - 2003
`
`
`
`
`
`Cinea, Inc.
`
`
`
`
`
`Herndon, VA
`
` 2
`
`

`

`
`
`Board of Advisors
` Corporate Strategy and Business Model
`
`Intellectual Property, technology, and security architecture
` Marketing to both studio and technology partners
` Financing
`Cinea develops and markets digital content protection technologies for cinema. Cinea is
`enabling the movie industry’s transition to digital distribution and projection.
`
`Annapolis, MD
`
`USinternetworking, Inc.
`
`1999 - 2001
`CTO
` Strategy: Corporate direction and roadmap
` Architecture: The context within which USi’s infrastructure, products, services, and
`processes operate
` Operational: Responsible for the productization, design, engineering, deployment,
`and support of USi’s communication services, security and disaster recovery products,
`and management and monitoring infrastructure
` Quality: Vulnerabilities, metrics, operational trends, design reviews
` Communication: Positioning the company for clients, industry, and financial analysts
`My focus at USi was threefold: inverting the Application Service Provider (ASP)
`operational concept from a collection of many client data centers under one roof to a
`single data center supporting many clients; introducing provisioning as a key competency
`of ASPs, in addition to the existing competencies of application management and
`support; and building the next generation telco from the synergy of bandwidth, storage,
`and computation.
`
`Divx
`
`Herndon, VA
`
`1997 - 1999
`Manager, Security Systems
` Lead design, development, and production of Divx’s second generation conditional
`access infrastructure.
` Active in industry working groups on conditional access for high-definition television,
`copy protection for broadcast and cable TV, and secure digital music.
`My focus at Divx was to develop an economically sound architecture for securing digital
`entertainment content. We designed a system that made it unprofitable for a pirate to
`leverage Divx’s distribution channels, media, and customer devices to compete with
`Divx’s value proposition to movie consumers and studios.
`Divx leveraged a system for labeling DVDs with a unique identifier, a DVD player that
`could read the identifier, and a service that tracks plays of the DVD and bill according to
`the pricing schedule.
`
`Washington, D.C.
`
`Naval Research Laboratory
`
`1993 - 1997
`Computer Scientist
` Developed enabling technologies for e-commerce analogs of standard business
`models and new types of transactions, with increased security and privacy.
` Designed “Onion Routing” (now called Tor), a system for anonymous communication
`over the Internet. The anonymous connections protect identity and location, in
`addition to transmitted data.
` Developed security architectures that minimize trusted components.
`
` 3
`
`

`

`
`
` Research in security and privacy.
`
`1991 - 1993
`Computer Scientist
` Responsible for introducing formal methods to Agency developments.
`
`National Security Agency
`
` Fort Meade, Maryland
`
`Computational Logic, Inc.
`1987 - 1991
`Computing Research Scientist
` Research in formal analysis of concurrent systems.
`
`1986 - 1987
`Research Assistant
` Research in automated theorem proving.
`
`ICSCA, University of Texas
`
`Austin, Texas
`
`Austin, Texas
`
`1984 - 1985
`
`Programmer
` Developed and maintained systems for analyzing and reporting vehicle test results.
`
`Software Services Corporation
`Ford Motor Company
`
`Detroit, Michigan
`
`Awards received
`
`Alan S. Berman Award at the Naval Research Laboratory, 1999.
`
`Education
`
`Outstanding Paper Award at the 11th Annual Computer Security Applications
`Conference, December 1995.
`
`MCD Fellowship at the University of Texas at Austin, 9/85-5/86.
`
`Merit Scholar at Wayne State University, Detroit, Michigan, 9/82-4/85.
`
`1985 - 1992
`Ph.D. Computer Science
` Dissertation: Mechanically Verifying Concurrent Programs
`
`University of Texas at Austin
`
`Austin, Texas
`
`Wayne State University
`1982 - 1985
`B.S. in Computer Science with a second major in Mathematics
`
`Detroit, Michigan
`
`Board of Advisors
`
`ClassifEye, 2007- 2008
`
`Zenoss, 2006 - 2007
`
`Trust Digital, 2005 - 2006
`
`Cinea, 2001-2003
`
` 4
`
`

`

`Patents
`
`
`
`MyWebOS.com, 2000-2002
`
`
`
`Method for Authentication and Assuring Compliance of Devices Accessing External
`Services, US9,64390B2, 5/9/2017 (with E. Dahl)
`
`
`
`Automated Multi-level Federation and Enforcement of Information Management Policies
`in a Device Network, US9,294,508B2, 3/22/2016 (with K Ginter, Y Weiss, M Bartman)
`
`Automated Multi-level Federation and Enforcement of Information Management Policies
`in a Device Network, US9,171,172B2, 10/27/2015 (with K Ginter, Y Weiss, M Bartman)
`
`System and Method for Controlling Mobile Device Access to a Network, US8,750,108,
`6/10/2014 (with N. Laudermilch, W. Supernor, R. Boroday)
`
`Mobile Risk Assessment, US8,677,497, 3/18/2014 (with P. Ganapathi Basavapatna, S.
`Kumar Gaddala, and S. Schrecker)
`
`System, method, and device for mediating connections between policy source servers,
`corporate repositories, and mobile devices, US8,565,726 B2, 10/22/2013, (with K. Sapp
`and D. Walker)
`
`System, method, and device for mediating connections between policy source servers,
`corporate repositories, and mobile devices, US8,528,042 B2, 9/3/2013, (with K. Sapp
`and D. Walker).
`
`Local Content Security System, US7,277,544 B1, 10/2/2007, (with R. Eye, T. Siner, J.
`Segal, R. Schumann).
`
`Digital Content Distribution System and Method, US7,162,642 B2, 1/9/2007, (with R.
`Schumann, R. Whittemore, D. Kravtiz, S. Iu, G. Mercier, M. Bergeron, J. Ehrhardt, and
`R. Vitkus).
`
`Hierarchical Key Management, US6,975,728 B1, 12/13/2005, (with R. Eye and D.
`Kravitz).
`
`Manufacturing Trusted Devices, US6,957,344, 10/18/2005, (with D. Kravitz).
`
`Key Management Encoding and Decoding, US6,907,127, 6/14/2005, (with D. Kravitz).
`
`Conditional Access via Secure Logging with Simplified Key Management, US6,738,905
`(with D. Kravitz).
`
`Onion Routing Network for Securely Moving Data through Communication Networks,
`US6,266,704, 7/24/2001 (with M. Reed and P. Syverson).
`
`System and Method for Electronic Transactions, US6,108,644, 8/22/2000 (with S.
`Stubblebine and P. Syverson).
`
` 5
`
`

`

`
`
`Publications
`
`
`34 Publications
`
`Trials or Depositions as
`Expert Witness
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` EMC Corporation. v. ActivIdentity, Inc. (Patent Owner) and Intellectual
`Ventures I LLC (Exclusive Licensee), Case No. IPR2017-00338 (PTAB)
`
` Symantec Corporation v. Intellectual Ventures I LLC, Case No. IPR2016-
`01433 (PTAB)
`
` Unified Patents Inc. v. Intellectual Ventures II LLC, Case No. IPR2016-
`01404 (PTAB)
`
` Commerce Bancshares, Inc. v. Intellectual Ventures II LLC, Case No.
`IPR2014-00801 (PTAB)
`
`
`
`
`
`International Business Machines Corporation v. Intellectual Ventures II
`LLC, Case No. IPR2014-00682 (PTAB)
`
`J.P. Morgan Chase & Co. v. Intellectual Ventures II LLC, Case No.
`CBM2014-00157 (PTAB)
`
` 6
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket