Search

Lesley Rice Matheson

age ~64

from Lake Dallas, TX

Also known as:
  • Lesley Dr Matheson
  • Lesley Te Matheson
  • Lesley R Matheson
  • Leslie R Matheson
  • Lesley Matheson Rice
  • Lesley R Rossi
  • E Matheson
  • Leslie Matherson

Lesley Matheson Phones & Addresses

  • Lake Dallas, TX
  • San Jose, CA
  • Saratoga, CA
  • 640 Beaver Ct, Byron, CA 94505 • 925 513-0801
  • Discovery Bay, CA
  • Sunriver, OR
  • Campbell, CA
  • Los Gatos, CA
  • Berwyn, PA
  • Paoli, PA
Name / Title
Company / Classification
Phones & Addresses
Lesley Matheson
Managing
37 South 4th Street Partners, LLC
Own and Hold Real Estate Investments · Business Consulting Services · Business Services
37 S 4 St, Campbell, CA 95008
Lesley Matheson
Principal
Cal Nor Auto Works
Auto Body Repair/Painting
180 E Sunnyoaks Ave, Campbell, CA 95008

Us Patents

  • Software Self-Checking Systems And Methods

    view source
  • US Patent:
    7581103, Aug 25, 2009
  • Filed:
    Jun 13, 2002
  • Appl. No.:
    10/172682
  • Inventors:
    William G. Home - Lawrenceville NJ, US
    Lesley R. Matheson - Discovery Bay CA, US
    Casey Sheehan - Hollister CA, US
    Robert E. Tarjan - Princeton NJ, US
  • Assignee:
    InterTrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/00
    H04L 9/32
  • US Classification:
    713176, 713181, 713187
  • Abstract:
    Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7779270, Aug 17, 2010
  • Filed:
    May 13, 2005
  • Appl. No.:
    11/129106
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 11/30
  • US Classification:
    713187, 713189
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7779394, Aug 17, 2010
  • Filed:
    May 11, 2005
  • Appl. No.:
    11/128097
  • Inventors:
    James J. Homing - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Home - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 9/45
    G06F 21/00
    G06F 11/30
  • US Classification:
    717136, 717140, 726 23, 726 26, 713182, 713187
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7823135, Oct 26, 2010
  • Filed:
    Apr 7, 2005
  • Appl. No.:
    11/102306
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 9/44
  • US Classification:
    717127, 717126, 713187, 713188, 713189, 713190
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Checking Systems And Methods

    view source
  • US Patent:
    8001388, Aug 16, 2011
  • Filed:
    Jul 16, 2009
  • Appl. No.:
    12/504567
  • Inventors:
    William G. Home - Lawrenceville NJ, US
    Lesley R. Matheson - Discovery Bay CA, US
    Casey Sheehan - Hollister CA, US
    Robert E. Tarjan - Princeton NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/32
    H04L 9/00
  • US Classification:
    713187, 713176, 726 26
  • Abstract:
    Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
  • Software Self-Checking Systems And Methods

    view source
  • US Patent:
    8352747, Jan 8, 2013
  • Filed:
    Aug 12, 2011
  • Appl. No.:
    13/208768
  • Inventors:
    William G. Horne - Lawrenceville NJ, US
    Lesley R. Matheson - Discovery Bay CA, US
    Casey Sheehan - Hollister CA, US
    Robert E. Tarjan - Princeton NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/32
  • US Classification:
    713187, 713176, 726 26
  • Abstract:
    Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    8387022, Feb 26, 2013
  • Filed:
    Aug 11, 2010
  • Appl. No.:
    12/854685
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Home - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan S. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    G06F 9/44
  • US Classification:
    717127, 713190, 713194
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    20070234070, Oct 4, 2007
  • Filed:
    Aug 17, 2006
  • Appl. No.:
    11/506321
  • Inventors:
    James Horning - Palo Alto CA, US
    W. Sibert - Lexington MA, US
    Robert Tarjan - Princeton NJ, US
    Urnesh Maheshwari - San Jose CA, US
    William Horne - Lawrenceville NJ, US
    Andrew Wright - Monroe Township NJ, US
    Lesley Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    H04N 7/16
    G06F 12/14
    H04L 9/32
    G06F 11/30
    G06F 17/30
    G06F 7/04
    G06K 9/00
    H03M 1/68
    H04K 1/00
    H04L 9/00
  • US Classification:
    713190000, 713187000, 726026000
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

Flickr

Facebook

Lesley Matheson Photo 3

Lesley Matheson

view source
Lesley Matheson Photo 4

Lesley Matheson

view source
Lesley Matheson Photo 5

Lesley Matheson

view source
Lesley Matheson Photo 6

Lesley Matheson

view source

Myspace

Lesley Matheson Photo 7

Lesley Matheson

view source
Locality:
United Kingdom
Gender:
Female
Birthday:
1923
Lesley Matheson Photo 8

Lesley Matheson

view source
Locality:
United Kingdom
Gender:
Female
Birthday:
1932

Googleplus

Lesley Matheson Photo 9

Lesley Matheson

Classmates

Lesley Matheson Photo 10

Broadlands Public School,...

view source
Graduates:
Lesley Matheson (1967-1971),
Lisa Jamieson (1969-1973),
Karyn Graham (1991-1994),
Jon Simpson (1967-1967)

Youtube

2 MEN AND A LESLEY ATTEND HORS D'OEUVRES MUKB...

I don't know what I like but if I like it it's art. Also can vaping sa...

  • Duration:
    1h 33m 15s

Pathways to Impact? Lesley McAra

Pathways to Impact? The Politics of Knowledge Production and the Limit...

  • Duration:
    47m 39s

Lesley Hazleton: A "tourist" reads the Koran

TEDTalks is a daily video podcast of the best talks and performances f...

  • Duration:
    10m 6s

Maleficent: Lesley Manville "Flittle" On Set ...

#MaleficentBTS #ScreenSlam About ScreenSlam: We are an Entertainment c...

  • Duration:
    2m 31s

Stanford Jazz Giant Steps Leland

  • Duration:
    3m 54s

Lesley Manville on Her Acting Process | Mum

Lesley Manville, who plays Cathy Bradshaw in 'Mum', breaks down her ac...

  • Duration:
    3m 31s

Get Report for Lesley Rice Matheson from Lake Dallas, TX, age ~64
Control profile