ACCESS MONITORING SYSTEMS

Brand Owner (click to sort) Address Description
ENTRYWATCH PACKAGE TELULAR CORPORATION 311 South Wacker Drive, Suite 4300 Chicago IL 60606 Access monitoring systems in the nature of downloadable software applications for mobile devices and computers for use in monitoring and controlling access control equipment, namely, video cameras, video monitors, microphones, and audio speakers;ENTRY WATCH PACKAGE;PACKAGE;
PETVIEW PACKAGE TELULAR CORPORATION 311 South Wacker Drive, Suite 4300 Chicago IL 60606 Access monitoring systems in the nature of downloadable software applications for download to mobile devices and computers for monitoring and controlling the access control equipment;PET VIEW PACKAGE;PACKAGE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographical area serving, for example, a wide variety of commercial and public sites, an organizational structure, or the like, for alarms. Upon analyzing an alarm for various characteristics, the Level 1 monitoring center can refer the unauthorized access attempt to an appropriate Level 2 center for, for example, possible retaliatory and/or legal action. Then, a Level 3 monitoring center can record and maintain an overall picture of the security of one or more networks, the plurality of monitoring centers and information about one or more hacking attempts.