1
Sheymov Victor I: Method and system for protecting a communication device from intrusion. Invicta Networks, July 31, 2002: EP1226499-A1 (1 worldwide citation)

The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a managment unit (18) which generates a ra ...


2
Sheymov Victor I: Method and system for protecting a communication device from intrusion. Invicta Networks, May 25, 2005: EP1533700-A2 (1 worldwide citation)

The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a management unit (18) which generates a r ...


3
Sheymov Victor I, Turner Roger B: Systems and methods for distributed network protection. Invicta Networks, VICK Jason H, December 6, 2001: WO/2001/093531 (1 worldwide citation)

By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempt. For example, a Level 1 monitoring center could monitor a predetermined geographic ...


4
Sheymov Victor I: Systems and methods for creating a code inspection system. Invicta Networks, November 12, 2003: EP1360585-A1

A code inspection system (10) produces a dynamic decoy machine (40) that closely parallels one or more protected systems (20). The code inspection system can analyze and monitor one or more protected systems and as those protected systems are updated, altered or modified, the dynamic decoy machine ( ...


5
Sheymov Victor I: Password protection system and method. Invicta Networks, September 23, 2009: GB2458426-A

A method, system, and device for password protection for a computer or other electronic device are provided, including providing one or more false passwords that outwardly cause the computer or other electronic device to behave as if a correct password was entered and that inwardly cause the compute ...


6
Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. Invicta Networks, February 19, 2003: EP1284092-A2

A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are ...


7
Sheymov Victor I: Method and system for preventing malicious code from being introduced into a protected network. Invicta Networks, October 3, 2007: EP1839173-A2

A method, system, and device for secure communications are provided, including at least one of means for configuring two or more computer devices as a single computer device; and means for separating the two or more computer devices from one or more computer networks.


8
Sheymov Victor I: Systems and methods for creating a code inspection system. Invicta Networks, VICK Jason H, August 22, 2002: WO/2002/065285

A code inspection system (10) produces a dynamic decoy machine (40) that closely parallels one or more protected systems (20). The code inspection system can analyze and monitor one or more protected systems and as those protected systems are updated, altered or modified, the dynamic decoy machine ( ...


9
Sheymov Victor I: Systems and methods for distributed network protection. Invicta Networks, VICK Jason H, February 28, 2002: WO/2002/017594

Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party. Specifically, in a protected network system, the protected network is capable of acting as a conduit thro ...


10
Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. Invicta Networks, VICK Jason H, November 29, 2001: WO/2001/091503

A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers are ...