Patents by Inventor David Goldschlag

David Goldschlag has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10305937
    Abstract: This invention provides secure, policy-based separation of data and applications on computer, especially personal computers that operate in different environments, such as those including personal applications and corporate applications, so that both types of applications can run simultaneously while complying with all required policies. The invention enables employees to use their personal devices for work purposes, or work devices for personal purposes. The secure, policy-based separation is created by dividing the data processing device into two or more “domains,” each with its own policies. These policies may be configured by the device owner, an IT department, or other data or application owner.
    Type: Grant
    Filed: May 25, 2018
    Date of Patent: May 28, 2019
    Assignee: Cellsec, Inc.
    Inventors: Yoav Weiss, David Goldschlag, Karl Ginter, Michael Bartman
  • Publication number: 20190139056
    Abstract: Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network.
    Type: Application
    Filed: January 4, 2019
    Publication date: May 9, 2019
    Inventors: David Goldschlag, Eric Dahl
  • Patent number: 10185963
    Abstract: Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: January 22, 2019
    Assignee: Cellsec, Inc.
    Inventors: David Goldschlag, Eric Dahl
  • Publication number: 20180302443
    Abstract: This invention provides secure, policy-based separation of data and applications on computer, especially personal computers that operate in different environments, such as those including personal applications and corporate applications, so that both types of applications can run simultaneously while complying with all required policies. The invention enables employees to use their personal devices for work purposes, or work devices for personal purposes. The secure, policy-based separation is created by dividing the data processing device into two or more “domains,” each with its own policies. These policies may be configured by the device owner, an IT department, or other data or application owner.
    Type: Application
    Filed: May 25, 2018
    Publication date: October 18, 2018
    Applicant: CellSec, Inc.
    Inventors: Yoav Weiss, David Goldschlag, Karl Ginter, Michael Bartman
  • Publication number: 20180005250
    Abstract: Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network.
    Type: Application
    Filed: April 24, 2017
    Publication date: January 4, 2018
    Inventors: David Goldschlag, Eric Dahl
  • Patent number: 9646309
    Abstract: Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network.
    Type: Grant
    Filed: April 6, 2015
    Date of Patent: May 9, 2017
    Inventors: David Goldschlag, Eric Dahl
  • Publication number: 20170026413
    Abstract: Methods, apparatus, systems, and non-transitory computer-readable media for managing a plurality of disparate computer application and data control policies on a computing device, especially a computing device connected to a computer network, are described. In one example, at least one policy distribution point is provided that includes least one policy distribution point including at least one information management policy. A plurality of policy enforcement points, including a first policy enforcement point operating at a first policy enforcement level, and a second enforcement point operating at second policy enforcement level, are also provided. A first policy element to the first policy enforcement point, and a second policy element to the second policy enforcement point, are allocated.
    Type: Application
    Filed: March 17, 2016
    Publication date: January 26, 2017
    Applicant: CellSec, Inc.
    Inventors: David Goldschlag, Karl Ginter, Yoav Weiss, Michael Bartman
  • Publication number: 20160292694
    Abstract: Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network.
    Type: Application
    Filed: April 6, 2015
    Publication date: October 6, 2016
    Inventors: David Goldschlag, Eric Dahl, Vadim Tanarvsky
  • Patent number: 9294508
    Abstract: Methods, apparatus, systems, and non-transitory computer-readable media for managing a plurality of disparate computer application and data control policies on a computing device, especially a computing device connected to a computer network, are described. In one example, at least one policy distribution point is provided that includes least one policy distribution point including at least one information management policy. A plurality of policy enforcement points, including a first policy enforcement point operating at a first policy enforcement level, and a second enforcement point operating at second policy enforcement level, are also provided. A first policy element to the first policy enforcement point, and a second policy element to the second policy enforcement point, are allocated.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: March 22, 2016
    Assignee: CELLSEC INC.
    Inventors: David Goldschlag, Karl Ginter, Yoav Weiss, Michael Bartman
  • Patent number: 9171172
    Abstract: Methods, apparatus, systems, and non-transitory computer-readable media for managing a plurality of disparate computer application and data control policies on a computing device, especially a computing device connected to a computer network, are described. In one example, at least one policy distribution point is provided that includes least one policy distribution point including at least one information management policy. A plurality of policy enforcement points, including a first policy enforcement point operating at a first policy enforcement level, and a second enforcement point operating at second policy enforcement level, are also provided. A first policy element to the first policy enforcement point, and a second policy element to the second policy enforcement point, are allocated.
    Type: Grant
    Filed: August 2, 2013
    Date of Patent: October 27, 2015
    Assignee: CellSec, Inc.
    Inventors: David Goldschlag, Karl Ginter, Yoav Weiss, Michael Bartman
  • Patent number: 8935384
    Abstract: A policy proxy intercepts a data stream between a data server and a user or other device, identifies the user device, and identifies a policy in an integrated policy server applicable to the user device based on the identity of the user device. The policy proxy may identify one or more of the policy elements based on the user device, and translate the policy elements into actions involving the data stream between the data server and the user device so as to implement at least one aspect of the identified policy. The actions can comprise permitting normal exchange of data between the data server and the user device, preventing communication between the data server and the user device, or modifying the data stream between the data server and the user device.
    Type: Grant
    Filed: May 6, 2011
    Date of Patent: January 13, 2015
    Assignee: McAfee Inc.
    Inventors: David Goldschlag, Kevin Sapp, David Walker
  • Publication number: 20140357253
    Abstract: The invention provides a method for managing access to a network resource on a network from a mobile device, the method including the steps of intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.
    Type: Application
    Filed: June 9, 2014
    Publication date: December 4, 2014
    Inventors: Norm Laudermilch, William Supernor, Roman Boroday, David Goldschlag
  • Publication number: 20140165134
    Abstract: Methods, apparatus, systems, and non-transitory computer-readable media for managing a plurality of disparate computer application and data control policies on a computing device, especially a computing device connected to a computer network, are described. In one example, at least one policy distribution point is provided that includes least one policy distribution point including at least one information management policy. A plurality of policy enforcement points, including a first policy enforcement point operating at a first policy enforcement level, and a second enforcement point operating at second policy enforcement level, are also provided. A first policy element to the first policy enforcement point, and a second policy element to the second policy enforcement point, are allocated.
    Type: Application
    Filed: August 2, 2013
    Publication date: June 12, 2014
    Applicant: CELLSEC LIMITED
    Inventors: David Goldschlag, Karl Ginter, Yoav Weiss, Michael Bartman
  • Patent number: 8750108
    Abstract: The method may include intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.
    Type: Grant
    Filed: April 29, 2012
    Date of Patent: June 10, 2014
    Assignee: McAfee, Inc.
    Inventors: Norm Laudermilch, William Supernor, Roman Boroday, David Goldschlag
  • Publication number: 20140130119
    Abstract: Methods, apparatus, systems, and non-transitory computer-readable media for managing a plurality of disparate computer application and data control policies on a computing device, especially a computing device connected to a computer network, are described. In one example, at least one policy distribution point is provided that includes least one policy distribution point including at least one information management policy. A plurality of policy enforcement points, including a first policy enforcement point operating at a first policy enforcement level, and a second enforcement point operating at second policy enforcement level, are also provided. A first policy element to the first policy enforcement point, and a second policy element to the second policy enforcement point, are allocated.
    Type: Application
    Filed: October 31, 2013
    Publication date: May 8, 2014
    Applicant: CELLSEC INC.
    Inventors: David Goldschlag, Karl Ginter, Yoav Weiss, Michael Bartman
  • Patent number: 8572676
    Abstract: The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The invention also relates to providing policy from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. The invention further relates to controlling access to a data server by a mobile device, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy.
    Type: Grant
    Filed: November 6, 2009
    Date of Patent: October 29, 2013
    Assignee: McAfee, Inc.
    Inventors: Kevin Sapp, David Goldschlag, David Walker
  • Patent number: 8565726
    Abstract: The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The invention also relates to providing policy from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. The invention further relates to controlling access to a data server by a mobile device, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy.
    Type: Grant
    Filed: November 6, 2009
    Date of Patent: October 22, 2013
    Assignee: McAfee, Inc.
    Inventors: David Walker, Kevin Sapp, David Goldschlag
  • Patent number: 8528042
    Abstract: The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The invention also relates to providing policy from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. The invention further relates to controlling access to a data server by a mobile device, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy.
    Type: Grant
    Filed: November 6, 2009
    Date of Patent: September 3, 2013
    Assignee: McAfee, Inc.
    Inventors: Kevin Sapp, David Goldschlag, David Walker
  • Publication number: 20120270523
    Abstract: The method may include intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.
    Type: Application
    Filed: April 29, 2012
    Publication date: October 25, 2012
    Applicant: MCAFEE, INC.
    Inventors: Norm Laudermilch, William Supernor, Roman Boroday, David Goldschlag
  • Publication number: 20120270522
    Abstract: The method may include intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.
    Type: Application
    Filed: April 29, 2012
    Publication date: October 25, 2012
    Applicant: MCAFEE, INC.
    Inventors: Norm Laudermilch, William Supernor, Roman Boroday, David Goldschlag