Patents by Inventor David Goldschlag

David Goldschlag has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8259568
    Abstract: The invention provides a method for managing access to a network resource on a network from a mobile device, the method including the steps of intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.
    Type: Grant
    Filed: October 23, 2007
    Date of Patent: September 4, 2012
    Assignee: McAfee, Inc.
    Inventors: Norm Laudermilch, William Supernor, Roman Boroday, David Goldschlag
  • Publication number: 20110276683
    Abstract: A policy proxy intercepts a data stream between a data server and a user or other device, identifies the user device, and identifies a policy in an integrated policy server applicable to the user device based on the identity of the user device. The policy proxy may identify one or more of the policy elements based on the user device, and translate the policy elements into actions involving the data stream between the data server and the user device so as to implement at least one aspect of the identified policy. The actions can comprise permitting normal exchange of data between the data server and the user device, preventing communication between the data server and the user device, or modifying the data stream between the data server and the user device.
    Type: Application
    Filed: May 6, 2011
    Publication date: November 10, 2011
    Applicant: TRUST DIGITAL, LLC
    Inventors: David Goldschlag, Kevin Sapp, David Walker
  • Publication number: 20110167470
    Abstract: Policy is provided from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. Policy can also be provided from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. Access to a data server by a mobile device can be controlled, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy.
    Type: Application
    Filed: July 6, 2010
    Publication date: July 7, 2011
    Applicant: Trust Digital, LLC
    Inventors: David Walker, Kevin Sapp, David Goldschlag, Majid Shahbazi
  • Publication number: 20100112983
    Abstract: The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The invention also relates to providing policy from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. The invention further relates to controlling access to a data server by a mobile device, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy.
    Type: Application
    Filed: November 6, 2009
    Publication date: May 6, 2010
    Applicant: Trust Digital
    Inventors: David WALKER, Kevin Sapp, David Goldschlag
  • Publication number: 20100115582
    Abstract: The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The invention also relates to providing policy from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. The invention further relates to controlling access to a data server by a mobile device, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy.
    Type: Application
    Filed: November 6, 2009
    Publication date: May 6, 2010
    Applicant: Trust Digital
    Inventors: Kevin Sapp, David Goldschlag, David Walker
  • Publication number: 20100115581
    Abstract: The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The invention also relates to providing policy from an integrated policy server to a mobile device, including identifying a policy in the integrated policy server applicable to the mobile device, determining whether the mobile device is in compliance with the policy, and supplying policy elements to policy transports for transmission to the mobile device when the mobile device is not in compliance with the policy. The invention further relates to controlling access to a data server by a mobile device, including identifying a policy in an integrated policy server applicable to the mobile device, and determining whether the mobile device is in compliance with the policy.
    Type: Application
    Filed: November 6, 2009
    Publication date: May 6, 2010
    Applicant: TRUST DIGITAL
    Inventors: David Goldschlag, Kevin Sapp, David Walker
  • Publication number: 20080137593
    Abstract: The invention provides a method for managing access to a network resource on a network from a mobile device, the method including the steps of intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.
    Type: Application
    Filed: October 23, 2007
    Publication date: June 12, 2008
    Applicant: TRUST DIGITAL
    Inventors: Norm LAUDERMILCH, William SUPERNOR, Roman BORODAY, David GOLDSCHLAG
  • Publication number: 20070286421
    Abstract: A content distribution system and method which prevents unauthorized access to secured content such as movies and music. The system includes a source, a receiver, an authorized security device such as a conditional access module (CAM) for decrypting authorized content and an output device for outputting content. The system can also include a backend for managing accounts and system operations. One aspect of this invention is that the content data is derived from the Internet. The system allows for the verification of authorization to play secured content, the addition of watermarks to the secured content, the conversion of the secured content to a displayable form and the means for preventing output of the secured content.
    Type: Application
    Filed: October 11, 2006
    Publication date: December 13, 2007
    Inventors: Robert Schumann, Richard Whittemore, David Goldschlag, David Kravitz, Siu-Leong Iu, Guillaume Mercier, Michael Bergeron, Jack Ehrhardt, Richard Vitkus
  • Publication number: 20060036480
    Abstract: A system and method for performing an electronic transaction, including registration, audit and trusted recovery features. A transaction request message is received from a registered user that includes an unblinded validated certificate, and a blinded unvalidated certificate. If the unblinded validated certificate is determined to be legitimate, then a transaction can be performed, and the blinded unvalidated certificate is validated to obtain a blinded, validated certificate that is sent to the user. An audit protocol can be used to further verify the legitimacy of the transaction request message, and a user can recover from a broken connection by replaying a protocol run.
    Type: Application
    Filed: September 27, 2005
    Publication date: February 16, 2006
    Inventors: David Goldschlag, Stuart Stubblebine, Paul Syverson
  • Publication number: 20020112186
    Abstract: A computer network security arrangement and method are disclosed which provides in a distributed complex computer network an authentication and authorization access for limiting access to network devices. The different levels of authentication involve the login/password process; comparison against access control lists; and mandatory program protocol control. Included are audit trails for authenticated calls and denied access calls.
    Type: Application
    Filed: September 12, 2001
    Publication date: August 15, 2002
    Inventors: Tobias Ford, Robert Schwendinger, David Goldschlag