About
Scott Goldman is a highly respected Independent Board Director and technology executive…
Articles by Scott
Activity
-
Today, we recognize and celebrate Roy Riley’s retirement, which concludes an extraordinary 47-year career with Mueller Industries. With Michigan…
Today, we recognize and celebrate Roy Riley’s retirement, which concludes an extraordinary 47-year career with Mueller Industries. With Michigan…
Liked by Scott Goldman
Experience
-
Self-employed
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
Licenses & Certifications
Publications
-
500+ interviews, published articles, blog posts, quotes in major publications and more
Major media outlets outlets around the world, most popular print publications and dozens of conferences and events
See publicationThrough the course of my career I have written scores of articles, been quoted multiple times in most major business and trade publications and video media outlets including BBC, CNN, CNN Asia, CNBC, Fox News, MSNBC, NBC and others. I have been a featured, keynote speaker or panelist at dozens of conferences and events around the world. In addition I have written two books: "The Cooper Report" (the first-ever statistical analysis of cellular phone use in the United States) and "Ask the…
Through the course of my career I have written scores of articles, been quoted multiple times in most major business and trade publications and video media outlets including BBC, CNN, CNN Asia, CNBC, Fox News, MSNBC, NBC and others. I have been a featured, keynote speaker or panelist at dozens of conferences and events around the world. In addition I have written two books: "The Cooper Report" (the first-ever statistical analysis of cellular phone use in the United States) and "Ask the Wireless Wizard" (a guide to wireless terminology and technology for executives and non-geek-speaking people who seek a deeper understanding of what makes wireless devices work).
Patents
-
Credential-free identification and authentication system
Issued US 10050969
A method of authenticating a user so that they user can access a website without entering a unique user credential. A user accesses a target and is presented with an authentication code and an address, and the user sends the authentication code to that address. Alternatively, the user is pre-supplied with with an address and is presented with only the authentication code when the user accesses the target website. The user's identity is authenticated by comparing an aspect of the metadata of…
A method of authenticating a user so that they user can access a website without entering a unique user credential. A user accesses a target and is presented with an authentication code and an address, and the user sends the authentication code to that address. Alternatively, the user is pre-supplied with with an address and is presented with only the authentication code when the user accesses the target website. The user's identity is authenticated by comparing an aspect of the metadata of the message with known metadata aspects, and the user is authenticated by comparing the authentication key presented to the user with the one sent in the message. Both the user and the user's identity are authenticated in a single step without requiring the user to input any unique user credential.
Other inventorsSee patent -
Credential-free identification and authentication
Issued US 9430630
See patentA method of authenticating a user so that the user can access a website without entering a unique user credential. A user accesses a target and is presented with an authentication code and an address, and the user sends a message containing the authentication code to that address. Alternatively, the user is pre-supplied with an address and is presented only with an authentication code when the user accesses the target. The user's identity is authenticated by comparing an aspect of the metadata…
A method of authenticating a user so that the user can access a website without entering a unique user credential. A user accesses a target and is presented with an authentication code and an address, and the user sends a message containing the authentication code to that address. Alternatively, the user is pre-supplied with an address and is presented only with an authentication code when the user accesses the target. The user's identity is authenticated by comparing an aspect of the metadata of the message with known metadata aspects, and the user is authenticated by comparing the authentication key presented to the user with the one received in the message. Both the user and the user's identity are authenticated in a single step without requiring the user to input any unique user credential.
-
Text message authentication system
Issued US 8943561
A text messaging two-factor authentication system (2FA) that utilizes a mobile phone's unique device identifier (UDID) as the "fingerprint" for identity validation. TextKey turns the standard SMS-based two-factor authentication right-side-up by having the user send a text *from* their phone instead of the typical process where the user receives a text sent *to* their phone. This method is vastly more secure, simpler to implement and requires a zero learning curve for users - they see a…
A text messaging two-factor authentication system (2FA) that utilizes a mobile phone's unique device identifier (UDID) as the "fingerprint" for identity validation. TextKey turns the standard SMS-based two-factor authentication right-side-up by having the user send a text *from* their phone instead of the typical process where the user receives a text sent *to* their phone. This method is vastly more secure, simpler to implement and requires a zero learning curve for users - they see a one-time-password appear on their computer screen and just text that code into the TextKey platform from their cell phone.
Other inventorsSee patent
Courses
-
Xerox Professional Selling Skills I and II
-
Recommendations received
-
LinkedIn User
9 people have recommended Scott
Join now to viewMore activity by Scott
-
Yesterday, I had the incredible opportunity to tour the National Jewish Health campus in Denver, Colorado. As the leading respiratory hospital in the…
Yesterday, I had the incredible opportunity to tour the National Jewish Health campus in Denver, Colorado. As the leading respiratory hospital in the…
Liked by Scott Goldman
-
Yesterday, we held our annual Christmas Dinners for all of our employees on 3 separate shifts. We added a nice touch this year by having our managers…
Yesterday, we held our annual Christmas Dinners for all of our employees on 3 separate shifts. We added a nice touch this year by having our managers…
Liked by Scott Goldman
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content