Search

Lewis V Rothrock

from Sisters, OR
Age ~73

Lewis Rothrock Phones & Addresses

  • 16862 Royal Coachman Dr, Sisters, OR 97759 (503) 799-5051
  • 13681 Logie Trl, Hillsboro, OR 97124
  • 17320 Woodmere Ct, Beaverton, OR 97006
  • Tualatin, OR
  • Sunnyvale, CA

Resumes

Resumes

Lewis Rothrock Photo 1

Independent Computer Software Professional

View page
Location:
Hillsboro, Oregon
Industry:
Computer Software
Education:
California State University-Sacramento 1979 - 1983
Masters of Science, Computer Science
Lewis Rothrock Photo 2

Lewis Rothrock

View page

Publications

Us Patents

Method And Apparatus For Controlling A Remote Video Camera In A Video Conferencing System

View page
US Patent:
6380968, Apr 30, 2002
Filed:
Jan 6, 1998
Appl. No.:
09/003404
Inventors:
Theresa A. Alexander - Hillsboro OR
Lewis V. Rothrock - Beaverton OR
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04N 714
US Classification:
348 1405, 348 1409
Abstract:
An apparatus for use within a video conferencing system comprising an image analysis circuit and a control circuit is presented. As described herein, the image analysis circuit is operative to analyze at least a video frame of video conferencing signals of a video conference. The control circuit, coupled to the image analysis circuit, is operative to control a remote video camera of a remote conferencing apparatus communicatively coupled to the video conferencing apparatus to conduct the video conference, responsive to the results of said analysis.

Method And Apparatus For Controlling A Remote Video Camera In A Video Conferencing System

View page
US Patent:
6614465, Sep 2, 2003
Filed:
Sep 13, 2001
Appl. No.:
09/982675
Inventors:
Theresa A. Alexander - Hillsboro OR
Lewis V. Rothrock - Beaverton OR
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04N 714
US Classification:
348 1405, 348 1408
Abstract:
An apparatus for use within a video conferencing system comprising an image analysis circuit and a control circuit is presented. As described herein, the image analysis circuit is operative to analyze at least a video frame of video conferencing signals of a video conference. The control circuit, coupled to the image analysis circuit, is operative to control a remote video camera of a remote conferencing apparatus communicatively coupled to the video conferencing apparatus to conduct the video conference, responsive to the results of said analysis.

Deferred Sychronization Of Distributed Objects

View page
US Patent:
RE38457, Mar 9, 2004
Filed:
Apr 18, 1997
Appl. No.:
08/844281
Inventors:
Lewis V. Rothrock - Beaverton OR
Tyler R. Thessin - Portland OR
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04Q 1104
US Classification:
370261, 370263, 379202, 345330, 707512
Abstract:
A method and apparatus is disclosed for.

Digital Image Stitching

View page
US Patent:
7006111, Feb 28, 2006
Filed:
Nov 9, 1999
Appl. No.:
09/435940
Inventors:
Lewis V. Rothrock - Beaverton OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
G09G 5/00
US Classification:
345629, 345419, 345428, 345582, 345427
Abstract:
Where at least two digital images overlap at a first resolution level is identified. Overlapping areas of the at least two digital images at a second resolution level higher than the first resolution level are obtained. Where the overlapping areas overlap at the second resolution level is identified.

System And Method For Verifying Integrity Of System With Multiple Components

View page
US Patent:
7062650, Jun 13, 2006
Filed:
Sep 28, 2001
Appl. No.:
09/967738
Inventors:
Virginia L Robbins - Hillsboro OR, US
Lewis V Rothrock - Hillsboro OR, US
Carlos V Rozas - Portland OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
H04L 9/00
US Classification:
713167, 713165
Abstract:
A system and method for verifying integrity of a system with multiple components includes a plurality of related object components that forms the software system, a signed binary description file manager that generates a signed binary description file (SBDF) to store verification and license information of the plurality of related object components, and a verification agent that verifies itself and the plurality of related object components. The manager associates unique identification (ID) names that represents the related object components with corresponding sets of component license information, and stores the associations in the signed binary description file. The verification agent retrieves license information pertinent to itself and each of the related object components utilizing the SBDF. The verification agent verifies the related object components after verifying its own integrity.

Method Of Defending Software From Debugger Attacks

View page
US Patent:
7149900, Dec 12, 2006
Filed:
Dec 12, 2002
Appl. No.:
10/319736
Inventors:
Lewis V. Rothrock - Hillsboro OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
G06F 11/30
G06F 12/14
G06F 9/44
H04L 9/32
US Classification:
713189, 713187, 713194, 717124, 717129, 726 22, 726 26
Abstract:
Deterring an attack on a tamper-resistant application program may be accomplished by loading a plurality of agents and starting a plurality of processing threads, each thread executing one of the agents, concurrently executing each agent substantially in parallel to produce a processing result for each agent for an iteration of a stage of protocol processing, storing each processing result in an entry in a buffer associated with each agent, and repeating the executing and storing actions for multiple iterations of the protocol processing. When one of the agents stores a processing result in a last entry of the agent's buffer, the processing results from the first entries in the buffers are combined to produce a combined result, and if the combined result indicates an error, failure semantics may be executed.

Method Of Providing Adaptive Security

View page
US Patent:
7174320, Feb 6, 2007
Filed:
Apr 4, 2002
Appl. No.:
10/116979
Inventors:
Lewis V. Rothrock - Hillsboro OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
G06Q 99/00
US Classification:
705 58, 726 4, 713156, 705 59, 705 57
Abstract:
Providing adaptive security for access to content on a system may be accomplished by determining if a user has rights to access the content according to a content license associated with the content, and when the user has rights to play the content, performing the following actions. The system reads a data structure in the content license defining at least one security factor ID and an associated factor value, sets a security factor value for a security factor, the security factor corresponding to the security factor ID, to the associated factor value from the data structure, allows access to the content, and performs security processing by the system at a level based at least in part on the security factor value. In one embodiment, the security factor IDs and associated factor values are set by a content owner or distributor at the time of manufacturing or distributing the content.

Method Of Secure Function Loading

View page
US Patent:
7181603, Feb 20, 2007
Filed:
Mar 12, 2002
Appl. No.:
10/096685
Inventors:
Lewis V. Rothrock - Hillsboro OR, US
Richard L. Maliszewski - Forest Grove OR, US
Assignee:
Intel Corporation - Santa Clara CA
International Classification:
G06F 9/00
US Classification:
713 1, 713 2, 713175, 713176, 713187, 713190, 713191, 713193, 713194, 705 57, 705 58, 726 22, 726 26, 726 30
Abstract:
Redirecting function calls through a protected environment to effect secure linkage of program modules. In one embodiment, a program module, such as a player application for example, may make function calls to secure functions instead of to insecure operating system (OS) services, thereby deterring attacks on the player's calls to OS services. In one embodiment, the new secure functions provide similar functionality to the replaced OS services. Providing a securely loaded function for calling by a program module in place of calling an insecure OS function includes obtaining object code for the securely loaded function from a signed binary description file, performing signature and integrity verification of the program module using the signed binary description file, loading the object code for the securely loaded function into memory, and updating an address for calling the securely loaded function by the program module.
Lewis V Rothrock from Sisters, OR, age ~73 Get Report