throbber
PAUL C. CLARK
`4705 Broad Brook Drive, Bethesda, Maryland, 20814
`703.628.9500
`paul@securemethods.com
`
`SKILLS SUMMARY
`
`EMPLOYMENT
`
`
`July 1999 – Present
`
`Jan. 1995 – July 1999
`
`A senior executive with extensive IT design, development and deployment
`experience, Dr. Clark has twenty five years of direct technical and management
`experience in the computer and systems engineering environment. He is the
`President of Paul C. Clark LLC. His specialties include complex commercial
`development and deployment of scalable secure network and data processing
`systems. He has served as keynote speaker, expert witness for high profile
`commercial clients and before Congress. He has served on federal advisory
`committees and as an adjunct professor at The George Washington University.
`
`President and CTO
`SecureMethods Inc. / Paul C. Clark LLC
`Bethesda, MD
`• Serves as Managing Director
`• Manages operations and sales staff.
`• Manages commercial product development staff.
`Provides product design, development and deployment guidance.
`Provides sales engineering support and collected customer feedback.
`•
`• Defines and communicates strategic technical vision.
`• Successfully directed the development and deployment of commercial
`products on multiple Windows and Unix Platforms
`Chief Scientist
`DynCorp Network Solutions
`Fairfax, VA
`• Managed technical staff and deliverables for multiple large projects.
`Provided project design, development and troubleshooting guidance.
`Provided customer technical interface and problem resolution.
`•
`• Designed and deployed next generation architecture for high volume
`network database and storage systems.
`• Created a suite of secure products marketed and sold to DoD and the
`Federal Government.
`Provided corporate-wide technical consultation and support.
`•
`Senior Security Engineer
`Sept. 1990 – Jan. 1995
`Trusted Information Systems
`Glenwood, Maryland
`Participated in the design and implementation of the reference
`implementation of Privacy Enhanced Mail (PEM) with public and secret key
`encryption to provide security services for electronic transmissions.
`• Designed NIST's Smartcard API (SCAPI). Implemented the SCAPI for the
`NIST 250 and utilized it to perform cryptographic operations for PEM.
`Implemented X.500 Certification and Distinguished Naming support for PEM.
`Functions supported included: CA and user registration, revocation, and
`high speed database for certificate storage and retrieval.
`• Systems design and programming, including the TCB, for the Trusted Xenix
`and Trusted Mach MLS operating systems. Tasks included MAC labeling and
`audit strategies, as well as application development.
`• Designed and implemented multilevel electronic mail and HTTP proxy for
`Trusted Mach. Task included cryptographic support for the TCB as well as
`application specific validation and semantic checking for up/downgrade.
`Inventor of the Boot Integrity Token System (BITS), which provides
`hardware, enforced authentication within the boot sequence and guarantees
`operating system integrity.
`
`•
`
`•
`
`•
`
`•
`
`•
`
`1/3
`
`SAMSUNG EX. 1008
`
`

`

`
`
`
`
`
`
`
`
`HARDWARE
`
`SOFTWARE
`
`EDUCATION
`
`
`Nov 1989 – Sept 1990
`
`Technical Lead
`GTE Government Systems
`Rockville, MD
`• Managed the SAFE91 testbed effort with responsibilities including: budgets,
`schedules, customer negotiations, briefings, training, and tasking of
`technical staff. The testbed was created to simulate the client environment
`for the purpose of evaluating software packages and platforms for use by
`the client.
`• Developed network load simulations for OS/2 LAN Manager to determine
`performance characteristics during periods of heavy traffic. This task
`included the design and development of a multi-threaded connection server
`under OS/2 version 1.0
`• Designed and implemented an X Windows interface for the Minstrel
`System. This included the individual development of 20,000 lines of code
`in less than two months.
`• Developed and taught DEC Windows and X Windows classes for GTE
`technical personnel. Responsible for instruction and problem solving
`throughout the subsequent development cycle.
`
`May 1985 – Nov. 1989
`
`
`Systems Engineer
`Ultrasystems Defense and Space
`• Redesigned the Morse Mission Trainer while coordinating and tasking a
`team of programmers. During this time, received the President's quarterly
`award for outstanding performance. Task included systems and network
`and kernel level programming on SCO Xenix.
`• Designed and implemented a database file server, benchmarked at over
`100 retrievals per second on a million entry database. System
`implemented B* trees in C and ran on a Sun 3/260 workstation.
`• Designed and implemented a satellite mission scheduler for multiple
`vehicles with multiple resources. Task included defining areas of interest
`(AOIs), flight paths, and optimal time allocation of resources.
`• Designed and implemented the Ultraplot graphics tool to produce line and
`scatter plots, as well as bar graphs and histograms from large datafiles.
`This utility was implemented utilizing the DI3000 (device independent)
`graphics package.
`
`
`Mainframe, Workstation, PC, including: IBM, DEC, Sun, HP, SGI, Intel
`
`UNIX (Linux, System V, BSD, Solaris, AIX, IRIX, Xenix), MS DOS/Windows,
`VMS, OS/2, X Windows, DEC Windows, Presentation Manger, TCP/IP, X25,
`Xenix Net, IBM LAN, DEC Net, Ethernet, Token Ring
`
`DSc. in Computer Science
`Concentration in Security, Graphics, Intellectual Property Law
`The George Washington University, 1994
`
`M.S. in Electrical Engineering and Computer Science
`University of Southern California, 1988
`
`B.S. in Mathematics
`University of California Irvine, 1986
`
`Graduate level study in all major areas of computer science
`
`2/3
`
`SAMSUNG EX. 1008
`
`

`

`REPRESENTATIVE
`PUBLICATIONS
`
`
`ADDITIONAL
`INFORMATION
`
`RECENT CASES
`
`“BITS – A Smartcard Protected Operating System,” with Lance Hoffman,
`Communications of the ACM, November 1994.
`“Service Layering Promotes Secure Data Exchange in Diverse Environments,”
`Computer News, October 23, 1995
`“Threats Posed to Cryptographic Applications by Random Numbers,” presented
`to the RSA Data Security Conference, January 1996.
`“A Reference Model for Electronic Commerce,” with Daniel J. Blum and John
`Jauregui, Messaging Magazine, December 1996, Volume 2, Number 7.
`“Secure Compartmented Data Access over an Untrusted Network Using a
`COTS-based Architecture,” with Marion C. Meissner, and Karen O. Vance,
`Presented to the Annual Computer Security Applications Conference
`(ACSAC'00), New Orleans, December, 2000. Later published in “Statistical
`Methods in Computer Security,” Marcel Dekker, ISBN 0-8247-5939-7, edited
`by William W. S. Chen, 2005
`
`(1) Dr. Clark was a member of the Federal Advisory Committee for Key
`Management Infrastructure (KMI); he was Chairman of the Interoperability
`Working Group for Cryptographic Key Recovery.
`(2) Dr. Clark served as a Cooperative Research and Development Agreements
`(CRADA) partner, which is a joint effort between the National Institute of
`Standards and Technology (NIST) and several companies formed to begin
`development of the elements of a Public Key Infrastructure (PKI). A core
`element of this effort is the development of a Minimum Interoperability
`Specification for PKI components MISPC.
`(3) Dr. Clark serves as an adjunct professor in the Electrical Engineering and
`Computer Science Department at The George Washington University. He
`teaches doctoral level cryptography and computer security courses.
`(4) Speaker at The Federal Information Security Conference; presented
`“Embedded Security Deployment,” Colorado Springs, CO, March 31, 2006
`(5) Keynote Speaker for the Washington DC Bar Association; presented
`“Security for the Networked Computing Environment,” August 8, 2005
`(6) Appeared before Congressional committee to provide expert testimony;
`presented “Advanced Technology for Border Control,” July 23, 1998.
`(7) Keynote speaker at Mass Storage Conference; presented “Secure Data
`Access Over Public Networks,” New Orleans, LA, October, 1996
`(8) Keynote speaker at health care convention, presented “Security for Health
`Care Records,” Nashville, TN, May, 1997.
`(9) Keynote speaker at the USDA Plant and Genome Conference; presented "A
`Secure Architecture for Data and Systems," Nimes, France, October, 1997
`(10) Speaker at IEEE Technical Meeting; presented “A Comprehensive Security
`Architecture,” Virginia, June, 1996.
`Testifying expert for TransPerfect v MotionPoint – Verdict for Transperfect
`Testifying expert for Cisco – VirNetX v Cisco – Verdict for Cisco
`Testifying expert for CME – RealTime v CME – Summary judgment for CME
`Testifying expert for IBM et al – Tecsec v IBM – Summary judgment for IBM
`Testifying expert for Netflix et al – Parallel Networks v Netflix – Case dismissed
`Testifying expert for Alcatel – Alcatel v Microsoft – Settled in favor of Alcatel
`Testifying expert for Oracle - EpicRealm v Oracle – Summary judgment for
`Oracle
`Testifying expert for Lucent - Microsoft v Lucent –Verdict for Lucent
`Testifying expert for Oracle - Mangosoft v Oracle – Summary judgment for
`Oracle
`Testifying expert for RSA Data Security – Digital Privacy v RSA – Summary
`judgment for RSA at the Markman
`
`
`
`
`
`
`3/3
`
`SAMSUNG EX. 1008
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket