Patents Assigned to INVICTA Networks, Inc.
  • Publication number: 20120246724
    Abstract: A method, system, and computer program product for displaying detected cyber attacks over communications networks, including a radar type display section including one or more icons representing detected cyber attacks; an activity tracking display section including information regarding the detected cyber attacks represented by the icons; and an application information display section including at least one of system user information, session information, and statistics information regarding the cyber attacks.
    Type: Application
    Filed: May 14, 2010
    Publication date: September 27, 2012
    Applicant: INVICTA NETWORKS, INC.
    Inventors: Victor I. Sheymov, Jan Willem Valentijn Kerseboom
  • Publication number: 20120222090
    Abstract: A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user.
    Type: Application
    Filed: May 7, 2012
    Publication date: August 30, 2012
    Applicant: INVICTA NETWORKS INC.
    Inventor: Victor I. Sheymov
  • Publication number: 20120216288
    Abstract: A method, system, and computer program product for secure distribution of content over an insecure medium, including a recipient device configured to receive content; and a sender device configured to request from the recipient device a unique identification associated with the recipient device, before sending to the recipient device, the content and a unique key associated with the content for use of the content by the recipient device. The sender device is configured to request the unique identification associated with the recipient device from the recipient device during a predetermined time interval after sending the key, and after verification of the unique identification, send a new key associated with the content to the recipient device for further use of the content by the recipient device.
    Type: Application
    Filed: May 14, 2010
    Publication date: August 23, 2012
    Applicant: INVICTA NETWORKS, INC.
    Inventors: Victor I. Sheymov, Jan Willem Valentijn Kerseboom, James W. Dyer, Jean Dyer
  • Publication number: 20120137345
    Abstract: A method, system, and computer program product for cyber protection using variable cyber coordinates (VCC), including a variable cyber coordinates (VCC) controller unit configured to generate cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected routers; and the VCC controller unit configured to communicate the generated cyber coordinates to the protected routers with or without encryption and/or authentication. At a predetermined time interval or based on a command from the VCC controller unit, the routers and their respective control units (CU) are configured to change their cyber coordinates together or separately, to cyber coordinates newly generated by the VCC controller unit according to the VCC protocol.
    Type: Application
    Filed: August 9, 2010
    Publication date: May 31, 2012
    Applicant: INVICTA NETWORKS, INC.
    Inventor: Victor I. Sheymov
  • Patent number: 8176326
    Abstract: A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user.
    Type: Grant
    Filed: January 14, 2010
    Date of Patent: May 8, 2012
    Assignee: Invicta Networks, Inc.
    Inventor: Victor I. Sheymov
  • Publication number: 20120060220
    Abstract: A method, system, and computer program product for computer protection, including a protected computer having a protected operating system; and a secure operating system having a first virtual copy of at least a portion of the protected operating system and one or more security mechanisms configured to analyze potentially malicious code before the code is used by the protected computer.
    Type: Application
    Filed: May 14, 2010
    Publication date: March 8, 2012
    Applicant: INVICTA NETWORKS, INC.
    Inventors: Jan Willem Valentijn Kerseboom, Julian Delves Wynne, Michael David Lyons, James Ennis Segrave, Victor I. Sheymov
  • Publication number: 20110081886
    Abstract: A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are not used for identification and authorization during communication between the mobile unit and a base station. Instead, a set of private identifiers is determined and is known only to the phone company and the base stations controlling the mobile phone calls. These private identifiers allow dynamic and continual updating of the mobile phone and base station directories with current valid identifiers that are used for communication between the devices.
    Type: Application
    Filed: September 20, 2010
    Publication date: April 7, 2011
    Applicant: INVICTA NETWORKS, INC.
    Inventors: Victor I. Sheymov, Roger B. Turner
  • Publication number: 20110047627
    Abstract: A method, system, and device for secure data exfiltration from a closed communications network or system, including at least one of means for data exfiltration from one or more of computers or computing devices of a closed communications network or system to one or more of computers or computing devices on another communications network or system; and means for internal or external secure data storage coupled to the exfiltration means and the other communications network or system and configured to receive the data for exfiltration based on control from the exfiltration means.
    Type: Application
    Filed: March 9, 2009
    Publication date: February 24, 2011
    Applicant: INVICTA NETWORKS, INC.
    Inventor: Victor I. Sheymov
  • Publication number: 20110035484
    Abstract: A method, system and device for creating and managing a variable number of visible cyber coordinates, including at least one of means for generating a random or deterministic number; means for generating variable visible cyber coordinates based on the generated number; and means for employing the variable visible cyber coordinates during communications.
    Type: Application
    Filed: March 26, 2009
    Publication date: February 10, 2011
    Applicant: INVICTA NETWORKS, INC.
    Inventor: Victor I. Sheymov
  • Publication number: 20110016129
    Abstract: A method, system and device for variable or dynamic classification of users, devices, computers, systems, or information are provided, including at least one of means for sensing one or more inputs, including at least one of an event, a parameter, and time; and means for generating a classification or policy for allowing access to information based on one or more of the sensed inputs.
    Type: Application
    Filed: March 3, 2009
    Publication date: January 20, 2011
    Applicant: INVICTA NETWORKS, INC.
    Inventor: Victor I. Sheymov
  • Patent number: 7865732
    Abstract: A method, system and computer readable medium for secure e-commerce communications, including an e-commerce system, including a private system for maintaining confidential information; and a public system for maintaining non-confidential information. The private system provides variable cyber coordinates to authorized parties for secure communications with the private system, and the public system provides cyber coordinates to the general public for communications with the public system.
    Type: Grant
    Filed: February 10, 2009
    Date of Patent: January 4, 2011
    Assignee: Invicta Networks, Inc.
    Inventor: Victor I Sheymov
  • Patent number: 7802307
    Abstract: A communications apparatus and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are not used for identification and authorization during communication between the mobile unit and a base station. Instead, a set of private identifiers is determined and is known only to the phone company and the base stations controlling the mobile phone calls. These private identifiers allow dynamic and continual updating of the mobile phone and base station directories with current valid identifiers that are used for communication between the devices.
    Type: Grant
    Filed: June 22, 2007
    Date of Patent: September 21, 2010
    Assignee: Invicta Networks, Inc.
    Inventors: Victor I Sheymov, Roger B Turner
  • Publication number: 20100175131
    Abstract: A method, system, and device for protecting networking computers or devices from cyber attacks, including periodically changing cyber coordinates of a communications network or system; communicating the changed cyber coordinates to corresponding or reciprocal networks and/or devices so they can maintain communications; detecting a cyber attack or receiving notification from the corresponding or reciprocal networks and/or devices of a cyber attack; and changing the cyber coordinates of the network or system upon such detection or notification and communicating the changed cyber coordinates to the corresponding or reciprocal networks and/or devices.
    Type: Application
    Filed: May 28, 2008
    Publication date: July 8, 2010
    Applicant: INVICTA NETWORKS, INC
    Inventor: Victor I. Sheymov
  • Patent number: 7752432
    Abstract: A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in which potentially malicious code is tested, can also be updated. Thus, the dynamic decoy machine can accurately reflect the current state of the one or more protected systems such that the potentially destructive nature, if any, of suspicious code can be evaluated as if it were in the actual environment of the protected system, without jeopardizing the security of the protected system.
    Type: Grant
    Filed: March 6, 2006
    Date of Patent: July 6, 2010
    Assignee: Invicta Networks, Inc.
    Inventor: Victor I. Sheymov
  • Publication number: 20100146595
    Abstract: A method, system, and device for controlling access for networking computers or devices, including a controller (112, 126) that controls access to a communications network or system (102, 116) including networking computers or devices, wherein computers or devices or entities that can be granted access to the network or system are on a push file or list, and those that can be granted access based on an access request to the controller are on a pull file or list. The controller grants or denies access based on the push file or list without receiving the access request, grants or denies access based on the pull file or list, only after receiving the access request, and with proper jurisdiction and otherwise sends the access request to a higher level controller with jurisdiction over the controller. The process is repeated until the access request is granted or denied.
    Type: Application
    Filed: April 3, 2008
    Publication date: June 10, 2010
    Applicant: INVICTA NETWORKS, INC
    Inventor: Victor I. Sheymov
  • Publication number: 20100122078
    Abstract: A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in which potentially malicious code is tested, can also be updated. Thus, the dynamic decoy machine can accurately reflect the current state of the one or more protected systems such that the potentially destructive nature, if any, of suspicious code can be evaluated as if it were in the actual environment of the protected system, without jeopardizing the security of the protected system.
    Type: Application
    Filed: January 18, 2010
    Publication date: May 13, 2010
    Applicant: INVICTA NETWORKS INC.
    Inventor: Victor I. Sheymov
  • Publication number: 20100115280
    Abstract: A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user.
    Type: Application
    Filed: January 14, 2010
    Publication date: May 6, 2010
    Applicant: INVICTA NETWORKS INC.
    Inventor: Victor I. Sheymov
  • Patent number: 7698444
    Abstract: By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographical area serving, for example, a wide variety of commercial and public sites, an organizational structure, or the like, for alarms. Upon analyzing an alarm for various characteristics, the Level 1 monitoring center can refer the unauthorized access attempt to an appropriate Level 2 center for, for example, possible retaliatory and/or legal action. Then, a Level 3 monitoring center can record and maintain an overall picture of the security of one or more networks, the plurality of monitoring centers and information about one or more hacking attempts.
    Type: Grant
    Filed: March 22, 2007
    Date of Patent: April 13, 2010
    Assignee: Invicta Networks, Inc
    Inventors: Victor I. Sheymov, Roger B. Turner
  • Publication number: 20100050268
    Abstract: A method, system, and device for password protection for a computer or other electronic device are provided, including providing one or more false passwords that outwardly cause the computer or other electronic device to behave as if a correct password was entered and that inwardly cause the computer or other electronic device to behave differently than as if the correct password was entered; and taking a predetermined action when one of the false passwords is entered.
    Type: Application
    Filed: February 21, 2008
    Publication date: February 25, 2010
    Applicant: Invicta Networks Inc.
    Inventor: Victor I. Sheymov
  • Publication number: 20100042513
    Abstract: A method, system and computer readable medium for secure e-commerce communications, including an e-commerce system, including a private system for maintaining confidential information; and a public system for maintaining non-confidential information. The private system provides variable cyber coordinates to authorized parties for secure communications with the private system, and the public system provides cyber coordinates to the general public for communications with the public system.
    Type: Application
    Filed: February 10, 2009
    Publication date: February 18, 2010
    Applicant: Invicta Networks, Inc
    Inventor: Victor I. Sheymov