Patents by Inventor Victor I. Sheymov
Victor I. Sheymov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120246724Abstract: A method, system, and computer program product for displaying detected cyber attacks over communications networks, including a radar type display section including one or more icons representing detected cyber attacks; an activity tracking display section including information regarding the detected cyber attacks represented by the icons; and an application information display section including at least one of system user information, session information, and statistics information regarding the cyber attacks.Type: ApplicationFiled: May 14, 2010Publication date: September 27, 2012Applicant: INVICTA NETWORKS, INC.Inventors: Victor I. Sheymov, Jan Willem Valentijn Kerseboom
-
Publication number: 20120222090Abstract: A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user.Type: ApplicationFiled: May 7, 2012Publication date: August 30, 2012Applicant: INVICTA NETWORKS INC.Inventor: Victor I. Sheymov
-
Publication number: 20120216288Abstract: A method, system, and computer program product for secure distribution of content over an insecure medium, including a recipient device configured to receive content; and a sender device configured to request from the recipient device a unique identification associated with the recipient device, before sending to the recipient device, the content and a unique key associated with the content for use of the content by the recipient device. The sender device is configured to request the unique identification associated with the recipient device from the recipient device during a predetermined time interval after sending the key, and after verification of the unique identification, send a new key associated with the content to the recipient device for further use of the content by the recipient device.Type: ApplicationFiled: May 14, 2010Publication date: August 23, 2012Applicant: INVICTA NETWORKS, INC.Inventors: Victor I. Sheymov, Jan Willem Valentijn Kerseboom, James W. Dyer, Jean Dyer
-
Publication number: 20120137345Abstract: A method, system, and computer program product for cyber protection using variable cyber coordinates (VCC), including a variable cyber coordinates (VCC) controller unit configured to generate cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected routers; and the VCC controller unit configured to communicate the generated cyber coordinates to the protected routers with or without encryption and/or authentication. At a predetermined time interval or based on a command from the VCC controller unit, the routers and their respective control units (CU) are configured to change their cyber coordinates together or separately, to cyber coordinates newly generated by the VCC controller unit according to the VCC protocol.Type: ApplicationFiled: August 9, 2010Publication date: May 31, 2012Applicant: INVICTA NETWORKS, INC.Inventor: Victor I. Sheymov
-
Patent number: 8176326Abstract: A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user.Type: GrantFiled: January 14, 2010Date of Patent: May 8, 2012Assignee: Invicta Networks, Inc.Inventor: Victor I. Sheymov
-
Publication number: 20120060220Abstract: A method, system, and computer program product for computer protection, including a protected computer having a protected operating system; and a secure operating system having a first virtual copy of at least a portion of the protected operating system and one or more security mechanisms configured to analyze potentially malicious code before the code is used by the protected computer.Type: ApplicationFiled: May 14, 2010Publication date: March 8, 2012Applicant: INVICTA NETWORKS, INC.Inventors: Jan Willem Valentijn Kerseboom, Julian Delves Wynne, Michael David Lyons, James Ennis Segrave, Victor I. Sheymov
-
Publication number: 20110081886Abstract: A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are not used for identification and authorization during communication between the mobile unit and a base station. Instead, a set of private identifiers is determined and is known only to the phone company and the base stations controlling the mobile phone calls. These private identifiers allow dynamic and continual updating of the mobile phone and base station directories with current valid identifiers that are used for communication between the devices.Type: ApplicationFiled: September 20, 2010Publication date: April 7, 2011Applicant: INVICTA NETWORKS, INC.Inventors: Victor I. Sheymov, Roger B. Turner
-
Publication number: 20110047627Abstract: A method, system, and device for secure data exfiltration from a closed communications network or system, including at least one of means for data exfiltration from one or more of computers or computing devices of a closed communications network or system to one or more of computers or computing devices on another communications network or system; and means for internal or external secure data storage coupled to the exfiltration means and the other communications network or system and configured to receive the data for exfiltration based on control from the exfiltration means.Type: ApplicationFiled: March 9, 2009Publication date: February 24, 2011Applicant: INVICTA NETWORKS, INC.Inventor: Victor I. Sheymov
-
Publication number: 20110041188Abstract: A method, system, and computer program product for protection of an application or program, including making secret a command or commands that are normally fixed in an operating system (OS) and/or a Basic Input/Output System (BIOS); generating values or names for the command or commands; providing legitimate users and/or devices with the generated values or names for the command or commands for enabling receiving services from the kernel, OS, and/or the BIOS; translating the generated values or names for the command or commands via a translation mechanism provided between an application or program and the kernel, OS, and/or BIOS for enabling receiving services from the kernel, OS, and/SEND or the BIOS; and modifying, changing, and/or replacing the generated values or names employed for the command or commands in the kernel, OS, and/or BIOS.Type: ApplicationFiled: April 27, 2009Publication date: February 17, 2011Inventor: Victor I. Sheymov
-
Publication number: 20110035484Abstract: A method, system and device for creating and managing a variable number of visible cyber coordinates, including at least one of means for generating a random or deterministic number; means for generating variable visible cyber coordinates based on the generated number; and means for employing the variable visible cyber coordinates during communications.Type: ApplicationFiled: March 26, 2009Publication date: February 10, 2011Applicant: INVICTA NETWORKS, INC.Inventor: Victor I. Sheymov
-
Publication number: 20110016129Abstract: A method, system and device for variable or dynamic classification of users, devices, computers, systems, or information are provided, including at least one of means for sensing one or more inputs, including at least one of an event, a parameter, and time; and means for generating a classification or policy for allowing access to information based on one or more of the sensed inputs.Type: ApplicationFiled: March 3, 2009Publication date: January 20, 2011Applicant: INVICTA NETWORKS, INC.Inventor: Victor I. Sheymov
-
Patent number: 7865732Abstract: A method, system and computer readable medium for secure e-commerce communications, including an e-commerce system, including a private system for maintaining confidential information; and a public system for maintaining non-confidential information. The private system provides variable cyber coordinates to authorized parties for secure communications with the private system, and the public system provides cyber coordinates to the general public for communications with the public system.Type: GrantFiled: February 10, 2009Date of Patent: January 4, 2011Assignee: Invicta Networks, Inc.Inventor: Victor I Sheymov
-
Patent number: 7802307Abstract: A communications apparatus and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are not used for identification and authorization during communication between the mobile unit and a base station. Instead, a set of private identifiers is determined and is known only to the phone company and the base stations controlling the mobile phone calls. These private identifiers allow dynamic and continual updating of the mobile phone and base station directories with current valid identifiers that are used for communication between the devices.Type: GrantFiled: June 22, 2007Date of Patent: September 21, 2010Assignee: Invicta Networks, Inc.Inventors: Victor I Sheymov, Roger B Turner
-
Publication number: 20100175131Abstract: A method, system, and device for protecting networking computers or devices from cyber attacks, including periodically changing cyber coordinates of a communications network or system; communicating the changed cyber coordinates to corresponding or reciprocal networks and/or devices so they can maintain communications; detecting a cyber attack or receiving notification from the corresponding or reciprocal networks and/or devices of a cyber attack; and changing the cyber coordinates of the network or system upon such detection or notification and communicating the changed cyber coordinates to the corresponding or reciprocal networks and/or devices.Type: ApplicationFiled: May 28, 2008Publication date: July 8, 2010Applicant: INVICTA NETWORKS, INCInventor: Victor I. Sheymov
-
Patent number: 7752432Abstract: A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in which potentially malicious code is tested, can also be updated. Thus, the dynamic decoy machine can accurately reflect the current state of the one or more protected systems such that the potentially destructive nature, if any, of suspicious code can be evaluated as if it were in the actual environment of the protected system, without jeopardizing the security of the protected system.Type: GrantFiled: March 6, 2006Date of Patent: July 6, 2010Assignee: Invicta Networks, Inc.Inventor: Victor I. Sheymov
-
Publication number: 20100146595Abstract: A method, system, and device for controlling access for networking computers or devices, including a controller (112, 126) that controls access to a communications network or system (102, 116) including networking computers or devices, wherein computers or devices or entities that can be granted access to the network or system are on a push file or list, and those that can be granted access based on an access request to the controller are on a pull file or list. The controller grants or denies access based on the push file or list without receiving the access request, grants or denies access based on the pull file or list, only after receiving the access request, and with proper jurisdiction and otherwise sends the access request to a higher level controller with jurisdiction over the controller. The process is repeated until the access request is granted or denied.Type: ApplicationFiled: April 3, 2008Publication date: June 10, 2010Applicant: INVICTA NETWORKS, INCInventor: Victor I. Sheymov
-
Publication number: 20100122078Abstract: A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in which potentially malicious code is tested, can also be updated. Thus, the dynamic decoy machine can accurately reflect the current state of the one or more protected systems such that the potentially destructive nature, if any, of suspicious code can be evaluated as if it were in the actual environment of the protected system, without jeopardizing the security of the protected system.Type: ApplicationFiled: January 18, 2010Publication date: May 13, 2010Applicant: INVICTA NETWORKS INC.Inventor: Victor I. Sheymov
-
Publication number: 20100115280Abstract: A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provided to a user address book and assigned with a permanent identifier and the permanent identifier, but not the variable identifier, is available to a user. The presence or absence of the correct variable identifier is sensed during an attempt to access the communications device for granting or denying access to the communications device. A new variable identifier is periodically provided to the communications device and to the authorized entities and to the user address book and assigned with the permanent identifier, wherein the permanent identifier, but not the new variable identifier, is available to the user.Type: ApplicationFiled: January 14, 2010Publication date: May 6, 2010Applicant: INVICTA NETWORKS INC.Inventor: Victor I. Sheymov
-
Patent number: 7698444Abstract: By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographical area serving, for example, a wide variety of commercial and public sites, an organizational structure, or the like, for alarms. Upon analyzing an alarm for various characteristics, the Level 1 monitoring center can refer the unauthorized access attempt to an appropriate Level 2 center for, for example, possible retaliatory and/or legal action. Then, a Level 3 monitoring center can record and maintain an overall picture of the security of one or more networks, the plurality of monitoring centers and information about one or more hacking attempts.Type: GrantFiled: March 22, 2007Date of Patent: April 13, 2010Assignee: Invicta Networks, IncInventors: Victor I. Sheymov, Roger B. Turner
-
Publication number: 20100050268Abstract: A method, system, and device for password protection for a computer or other electronic device are provided, including providing one or more false passwords that outwardly cause the computer or other electronic device to behave as if a correct password was entered and that inwardly cause the computer or other electronic device to behave differently than as if the correct password was entered; and taking a predetermined action when one of the false passwords is entered.Type: ApplicationFiled: February 21, 2008Publication date: February 25, 2010Applicant: Invicta Networks Inc.Inventor: Victor I. Sheymov