NETWORK BOUNDARY

Brand Owner (click to sort) Address Description
NETBOUNDARY Tekhnikos Solutions, Inc. 3413 Pecan Meadow Dr. Flower Mound TX 75028 NETWORK BOUNDARY;Network and computer security services, namely, network security for protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management and security monitoring services;
NETBOUNDARY NETBOUNDARY, INC. 12005 FORD RD STE 535 DALLAS TX 75234 NETWORK BOUNDARY;Network and computer security services, namely, network security for protection of computer networks, managing and monitoring log-ins, security alerts and firewalls, detecting and reporting compliance, intrusions and threats and providing penetration testing for vulnerabilities in network systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Security of wireless networks is improved by rejecting traffic from a wireless device located outside a defined spatial boundary. The device's spatial position with respect to the boundary is determined using directional antenna arrays on a plurality of measurement points, and calculating where the vectors intersect. Having thus determined a device's location, access to a wireless network can be denied if the device is outside a predetermined spatial boundary. Or, the device's location inside or outside of the spatial boundary can be used for monitoring a changeable location of one or more client devices in a wireless network, for example as a theft detection or theft deterrent mechanism.