1
Victor I Sheymov, Roger B Turner: Systems and methods for communication protection. Invicta Networks, Carlos R Villamar, Nixon Peabody, June 26, 2007: US07236598 (73 worldwide citation)

A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are ...


2
Victor I Sheymov: Method of communications and communication network intrusion protection methods and intrusion attempt detection system. INVICTA Networks, Carlos R Villamar, Nixon Peabody, December 27, 2005: US06981146 (46 worldwide citation)

The intrusion protection method and system for a communications network provides address agility wherein the cyber coordinates of a target host are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a management unit which generates a random seq ...


3
Victor I Sheymov, Roger B Turner: Systems and methods for distributed network protection. Invicta Networks, Carlos R Villamar, Nixon Peabody, March 27, 2007: US07197563 (41 worldwide citation)

By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographi ...


4
Victor I Sheymov: Systems and methods for creating a code inspection system. Invicta Networks, Carlos R Villamar, Nixon Peabody, March 7, 2006: US07010698 (32 worldwide citation)

A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in which poten ...


5
Victor I Sheymov, Roger B Turner: Systems and methods for distributed network protection. INVICTA Networks, Carlos R Villamar, Nixon Peabody, August 8, 2006: US07089303 (21 worldwide citation)

By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographi ...


6
Emil J Hatfalvi, James G Noble: Systems and methods that provide external network access from a protected network. INVICTA Networks, Carlos R Villamar, Nixon Peabody, July 3, 2007: US07240193 (15 worldwide citation)

A user who is connected to an unprotected network via a protected network is able to browse the Internet without concern that unauthorized code will execute within their local workstation as the result of a vulnerability within the browser executing on a special virtual machine or a browser module. ...


7
Victor I Sheymov, Roger B Turner: Systems and methods for distributed network protection. Invicta Networks, Roberts Mlotkowski Safran & Cole P C, July 29, 2008: US07406713 (12 worldwide citation)

Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party. Specifically, in a protected network system, the protected network is capable of acting as a conduit thro ...


8
Victor I Sheymov: Method of communications and communication network intrusion protection methods and intrusion attempt detection system. Invicta Networks, Carlos R Villamar, Roberts Mlotkowski Safran & Cole PC, March 17, 2009: US07506166 (6 worldwide citation)

A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable identifier is provi ...


9
Victor I Sheymov: Systems and methods for creating a code inspection system. Invicta Networks, Carlos R Villamar, Roberts Mlotkowski Safran & Cole P C, July 6, 2010: US07752432 (6 worldwide citation)

A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in which poten ...


10
Victor I Sheymov: Method and communications and communication network intrusion protection methods and intrusion attempt detection system. Invicta Networks, Carlos R Villamar, The Villamar Firm PLLC, January 4, 2011: US07865732 (3 worldwide citation)

A method, system and computer readable medium for secure e-commerce communications, including an e-commerce system, including a private system for maintaining confidential information; and a public system for maintaining non-confidential information. The private system provides variable cyber coordi ...