Sunnyvale, CA, United States of America

Matthew Douglas Howard


Average Co-Inventor Count = 6.0

ph-index = 1

Forward Citations = 22(Granted Patents)


Company Filing History:


Years Active: 2008

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovations by Matthew Douglas Howard

Introduction

Matthew Douglas Howard is an accomplished inventor based in Sunnyvale, CA. He has made significant contributions to the field of wireless network security. His innovative work focuses on the containment of rogue systems in wireless network environments.

Latest Patents

Matthew holds a patent for "Containment of rogue systems in wireless network environments." This patent describes methods, apparatuses, and systems that facilitate the containment of the effects of rogue or unauthorized access points on wireless computer network environments. The invention supports multiple rogue containment methodologies, including the identification of the physical connection of rogue access points to the wired network infrastructure. This allows for the disabling of that physical connection to contain the rogue access point. Additionally, the patent outlines wireless techniques for containing the effects of rogue access points, applicable to various wireless network system architectures. He has 1 patent to his name.

Career Highlights

Matthew is currently employed at Cisco Systems Inc., a leading company in networking and cybersecurity solutions. His work at Cisco has allowed him to apply his innovative ideas in a practical setting, contributing to the advancement of wireless network security.

Collaborations

Matthew has collaborated with notable colleagues, including Paul F. Dietrich and David Anthony Frascone. Their combined expertise has further enhanced the development of innovative solutions in the field.

Conclusion

Matthew Douglas Howard is a prominent inventor whose work in wireless network security has made a significant impact. His patent on rogue system containment showcases his innovative approach to addressing security challenges in wireless environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…