Addison, TX, United States of America

Ken W Elwell


Average Co-Inventor Count = 2.5

ph-index = 7

Forward Citations = 256(Granted Patents)


Company Filing History:


Years Active: 2004-2009

Loading Chart...
7 patents (USPTO):Explore Patents

Title: Ken W Elwell: Innovator in Network Security

Introduction

Ken W Elwell is a notable inventor based in Addison, TX, who has made significant contributions to the field of network security. With a total of seven patents to his name, Elwell has developed innovative solutions that enhance the safety and efficiency of network systems.

Latest Patents

Among his latest patents is the "Intrusion Detection System and Method." This invention provides a system, method, and computer program product that receives network traffic information from multiple controllers. The information is reported using at least one network-based interface, and a map of the network is generated based on this data. Additionally, the system offers intrusion detection services utilizing the network traffic information. Another significant patent is the "Enterprise Network Analyzer Zone Controller System and Method." This invention analyzes a network using a zone controller, receiving network traffic information from various host controllers and reporting it through multiple network-based interfaces.

Career Highlights

Throughout his career, Ken W Elwell has worked with prominent companies such as Networks Associates Technology, Inc. and McAfee, Inc. His experience in these organizations has allowed him to refine his skills and contribute to the development of advanced network security technologies.

Collaborations

Elwell has collaborated with notable professionals in the field, including Herbert V Joiner and Praveen Raghuraman. These partnerships have further enriched his work and led to innovative advancements in network security.

Conclusion

Ken W Elwell's contributions to network security through his patents and collaborations highlight his role as a key innovator in the industry. His work continues to influence the development of effective security solutions for modern networks.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…