Search

Lesley Rice Matheson

age ~64

from Lake Dallas, TX

Also known as:
  • Lesley Dr Matheson
  • Lesley Te Matheson
  • Lesley R Matheson
  • Leslie R Matheson
  • Lesley Matheson Rice
  • Lesley R Rossi
  • E Matheson
  • Leslie Matherson

Lesley Matheson Phones & Addresses

  • Lake Dallas, TX
  • San Jose, CA
  • Saratoga, CA
  • 640 Beaver Ct, Byron, CA 94505 • 925 513-0801
  • Discovery Bay, CA
  • Sunriver, OR
  • Campbell, CA
  • Los Gatos, CA
  • Berwyn, PA
  • Paoli, PA
Name / Title
Company / Classification
Phones & Addresses
Lesley Matheson
Managing
37 South 4th Street Partners, LLC
Own and Hold Real Estate Investments · Business Consulting Services · Business Services
37 S 4 St, Campbell, CA 95008
Lesley Matheson
Principal
Cal Nor Auto Works
Auto Body Repair/Painting
180 E Sunnyoaks Ave, Campbell, CA 95008

Us Patents

  • Software Self-Checking Systems And Methods

    view source
  • US Patent:
    7581103, Aug 25, 2009
  • Filed:
    Jun 13, 2002
  • Appl. No.:
    10/172682
  • Inventors:
    William G. Home - Lawrenceville NJ, US
    Lesley R. Matheson - Discovery Bay CA, US
    Casey Sheehan - Hollister CA, US
    Robert E. Tarjan - Princeton NJ, US
  • Assignee:
    InterTrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/00
    H04L 9/32
  • US Classification:
    713176, 713181, 713187
  • Abstract:
    Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7779270, Aug 17, 2010
  • Filed:
    May 13, 2005
  • Appl. No.:
    11/129106
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 11/30
  • US Classification:
    713187, 713189
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7779394, Aug 17, 2010
  • Filed:
    May 11, 2005
  • Appl. No.:
    11/128097
  • Inventors:
    James J. Homing - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Home - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 9/45
    G06F 21/00
    G06F 11/30
  • US Classification:
    717136, 717140, 726 23, 726 26, 713182, 713187
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7823135, Oct 26, 2010
  • Filed:
    Apr 7, 2005
  • Appl. No.:
    11/102306
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 9/44
  • US Classification:
    717127, 717126, 713187, 713188, 713189, 713190
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Checking Systems And Methods

    view source
  • US Patent:
    8001388, Aug 16, 2011
  • Filed:
    Jul 16, 2009
  • Appl. No.:
    12/504567
  • Inventors:
    William G. Home - Lawrenceville NJ, US
    Lesley R. Matheson - Discovery Bay CA, US
    Casey Sheehan - Hollister CA, US
    Robert E. Tarjan - Princeton NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/32
    H04L 9/00
  • US Classification:
    713187, 713176, 726 26
  • Abstract:
    Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
  • Software Self-Checking Systems And Methods

    view source
  • US Patent:
    8352747, Jan 8, 2013
  • Filed:
    Aug 12, 2011
  • Appl. No.:
    13/208768
  • Inventors:
    William G. Horne - Lawrenceville NJ, US
    Lesley R. Matheson - Discovery Bay CA, US
    Casey Sheehan - Hollister CA, US
    Robert E. Tarjan - Princeton NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/32
  • US Classification:
    713187, 713176, 726 26
  • Abstract:
    Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    8387022, Feb 26, 2013
  • Filed:
    Aug 11, 2010
  • Appl. No.:
    12/854685
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Home - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan S. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    G06F 9/44
  • US Classification:
    717127, 713190, 713194
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    20070234070, Oct 4, 2007
  • Filed:
    Aug 17, 2006
  • Appl. No.:
    11/506321
  • Inventors:
    James Horning - Palo Alto CA, US
    W. Sibert - Lexington MA, US
    Robert Tarjan - Princeton NJ, US
    Urnesh Maheshwari - San Jose CA, US
    William Horne - Lawrenceville NJ, US
    Andrew Wright - Monroe Township NJ, US
    Lesley Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    H04N 7/16
    G06F 12/14
    H04L 9/32
    G06F 11/30
    G06F 17/30
    G06F 7/04
    G06K 9/00
    H03M 1/68
    H04K 1/00
    H04L 9/00
  • US Classification:
    713190000, 713187000, 726026000
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

Flickr

Facebook

Lesley Matheson Photo 3

Lesley Matheson

view source
Lesley Matheson Photo 4

Lesley Matheson

view source
Lesley Matheson Photo 5

Lesley Matheson

view source
Lesley Matheson Photo 6

Lesley Matheson

view source

Myspace

Lesley Matheson Photo 7

Lesley Matheson

view source
Locality:
United Kingdom
Gender:
Female
Birthday:
1923
Lesley Matheson Photo 8

Lesley Matheson

view source
Locality:
United Kingdom
Gender:
Female
Birthday:
1932

Googleplus

Lesley Matheson Photo 9

Lesley Matheson

Classmates

Lesley Matheson Photo 10

Broadlands Public School,...

view source
Graduates:
Lesley Matheson (1967-1971),
Lisa Jamieson (1969-1973),
Karyn Graham (1991-1994),
Jon Simpson (1967-1967)

Youtube

Tales of Tomorrow - Ghost Writer (1/3)

Leslie Nielsen plays aspiring an novelist, Bert Tyler. Tyler is discou...

  • Category:
    Entertainment
  • Uploaded:
    14 Nov, 2009
  • Duration:
    9m 5s

Tales of Tomorrow - Ghost Writer (2/3)

Leslie Nielsen plays aspiring an novelist, Bert Tyler. Tyler is discou...

  • Category:
    Entertainment
  • Uploaded:
    14 Nov, 2009
  • Duration:
    10m 27s

Real Steel (HD Trailer)

Real Steel. Release Date: 7 October 2011 Genre: Action, Drama, Sci-Fi ...

  • Category:
    Film & Animation
  • Uploaded:
    10 Dec, 2010
  • Duration:
    1m 29s

Tales of Tomorrow - Ghost Writer (3/3)

Leslie Nielsen plays aspiring an novelist, Bert Tyler. Tyler is discou...

  • Category:
    Entertainment
  • Uploaded:
    14 Nov, 2009
  • Duration:
    8m 19s

DANCE TEAM TRYOUTS 2007

It's not a given that you'll make the Hamilton TigerCats Dance team. C...

  • Category:
    Sports
  • Uploaded:
    17 Jan, 2008
  • Duration:
    5m 15s

It Takes Two - Lamborghini (The Whole Movie)

Director: David Beaird Writers: Richard Christian Matheson, Thomas E. ...

  • Category:
    Film & Animation
  • Uploaded:
    15 Aug, 2011
  • Duration:
    1h 18m 8s

ABC Daytime Promo 1975

Oh no! General Hospital and One Life will not be seen today. Do not wo...

  • Category:
    Entertainment
  • Uploaded:
    06 Aug, 2010
  • Duration:
    35s

Arts Community Praise DPA in Newark

Divine Performing Arts final show at the New Jersey Performing Arts Ce...

  • Category:
    Entertainment
  • Uploaded:
    29 Jan, 2009
  • Duration:
    46s

Get Report for Lesley Rice Matheson from Lake Dallas, TX, age ~64
Control profile