Jump to content

Victor Sheymov: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
another source: The Daily Telegraph
Addition of worldwide patents and reference and technology description
Tag: possible BLP issue or vandalism
Line 3: Line 3:
Since becoming a US citizen Mr. Sheymov has been active in the computer security industry with [[Invicta Networks]] and other endeavors that address the protection of national governmental and commercial data bases and communications as well as programs to protect children and teens from Internet predators.
Since becoming a US citizen Mr. Sheymov has been active in the computer security industry with [[Invicta Networks]] and other endeavors that address the protection of national governmental and commercial data bases and communications as well as programs to protect children and teens from Internet predators.


Victor Sheymov, scientist, inventor, computer security expert, Russian expert, author and former Soviet KGB Major who defected to the [[United States]] in 1980 is the CEO of Invicta Networks, Inc., a [[Northern Virginia]] based developer of advanced cyber security technologies. The company was formed in year 2000. Its initial personnel were based on former NSA employees. Invicta Networks developed InvisiLAN® and WizArmorTM technologies among others.
Victor Sheymov, scientist, inventor, computer security expert, Russian expert, author and former Soviet KGB Major who defected to the [[United States]] in 1980 is the CEO of Invicta Networks, Inc., a [[Northern Virginia]] based developer of advanced cyber security technologies. The company was formed in year 2000. Its initial personnel were based on former NSA employees. Invicta Networks developed InvisiLAN® and WizArmorTM technologies among others.


According to the company<ref>Invicta Networks website[http://www.invictanetworks.net/]</ref>, Invicta Networks technology is based on Variable Cyber Coordinates (VCC) method of communication. InvisiLAN® is a groundbreaking product that proactively defends a company's private network and information assets from internal and external intrusion attempts by making the network cyber-invisible.
Specializing in cyber security, Mr. Sheymov was granted numerous patents in the United States, European Union, Australia, Japan, India, Korea, and China.<ref>"IPEXL Worldwide Patents Citation">[http://patent.ipexl.com/inventor/Sheymov_Victor_I_1.html] </ref> <ref>"United States Patent and Trademark Office">[http://patft.uspto.gov/] </ref>
InvisiLAN® randomizes virtually all communications parameters i.e. computers’ cyber coordinates, and distributes them only to authorized computers. This is an electronic implementation of the ultimate security principle of “need to know” basis. Furthermore, these parameters are changed rapidly, denying penetrating opportunities to even the most sophisticated attackers. In effect this technology allows protected networks to constantly morph themselves into different states, effectively thwarting cyber reconnaissance and cyber attacks.

Invicta Networks Inc. provides an unprecedented level of network security to any enterprise in any industry needing to protect proprietary data, including financial information, product R&D, customer or patient record, and other kinds of digital assets.

Specializing in cyber security, Mr. Sheymov was granted numerous patents in the United States, European Union, Australia, Japan, India, Korea, and China.<ref>"United States Patent and Trademark Office">[http://patft.uspto.gov/] </ref>

International patents include:<ref>"IPEXL Worldwide Patents Citation">[http://patent.ipexl.com/inventor/Sheymov_Victor_I_1.html] </ref>

1. Sheymov Victor I: Method of communications and communication network intrusion protection methods and intrusion attempt detection system. Comsec November 2000: WO 2000/070458 (4 worldwide citation)

2. Sheymov Victor I: Systems and methods for creating a code inspection system. Invicta Networks August 2002: WO 2002/065285 (2 worldwide citation)

3. Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. Invicta Networks November 2001: WO 2001/091503 (2 worldwide citation)

4. Sheymov Victor I, Turner Roger B: Systems and methods for distributed network protection. Invicta Networks December 2001: WO 2001/093531 (1 worldwide citation)

5. Sheymov Victor I: Systems and methods for creating a code inspection system. Invicta Networks November 2003: EP1360585

6. Sheymov Victor I: Password protection system and method. Invicta Networks September 2009: GB2458426
A method, system, and device for password protection for a computer or other electronic device are provided, including providing one or more false passwords that outwardly cause the computer or other electronic device to behave as if a correct password was entered and that inwardly cause the ...

7. Sheymov Victor I: Method and system for protecting a communication device from intrusion. Invicta Networks May 2005: EP1533700
The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a management unit (18) which generates a ...

8. Sheymov Victor I: Method and system for protecting a communication device from intrusion. Invicta Networks July 2002: EP1226499
The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a managment unit (18) which generates a ...

9. Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. Invicta Networks February 2003: EP1284092
A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers ...

10. Sheymov Victor I: Method and system for preventing malicious code from being introduced into a protected network. Invicta Networks October 2007: EP1839173
11. Sheymov Victor I: Method and system for network protection against cyber attacks. Invicta Networks December 2008: WO 2008/150786

12. Sheymov Victor I: Networking computers access control system and method. Invicta Networks October 2008: WO 2008/124479

13. Sheymov Victor I: Password protection system and method. Invicta Networks August 2008: WO 2008/103778

14. Sheymov Victor I: Method and system for preventing malicious code from being introduced into a protected network. Invicta Networks June 2006: WO 2006/062934

15. Sheymov Victor I: Systems and methods for distributed network protection. Invicta Networks February 2002: WO 2002/017594

16. Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. Invicta Networks April 2003: KR 1020027015904
A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers ...

17. Sheymov Victor I: Method of communications and communication network intrusion protection methods and intrusion attempt detection system. Invicta Networks April 2002: KR 1020017014589
The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a managment unit (18) which generates a ...

18. Sheymov Victor I: Method and system for preventing malicious code from being introduced into a protected network. Invicta Networks February 2008: CN 200580046202

19. Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. / Systemes et procedes servant a proteger une communication. Invicta Networks November 2001: CA 2409231
A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers ...

20. Sheymov Victor I: Method of communications and communication network intrusion protection methods and intrusion attempt detection system. / Procede de communication, procedes de protection contre l'intrusion pour reseau de communication, et systeme de detection de tentative d'intrusion. Invicta Networks November 2000: CA 2372662
The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a managment unit (18) which generates a ...

21. Sheymov Victor I: Method and system for preventing malicious code from being introduced into a protected network. / Procede et systeme permettant d'empecher un code frauduleux d'etre introduit dans un reseau protege. Invicta Networks June 2006: CA 2590740

22. Sheymov Victor I: 用來防止惡意碼被引進到受保護網路中的方法和系統. / Method and system for preventing malicious code from being introduced into a protected network. Invicta Networks October 2008: HK 1114194

23. Sheymov Victor I, Turner Roger B: Communication protection system and method. Invicta Networks June 2008: JP 2008-136181

24. Sheymov Victor I: Communication method, communication network intrusion protection methods, and intrusion attempt detection system. Invicta Networks July 2007: JP 2007-189725

25. Sheymov Victor I: Method and system for secure data exfiltration from a closed network or system. Invicta Networks September 2009: WO 2009/114436

26. Sheymov Victor I: (ip) Addresses. Invicta Networks October 2009: WO 2009/129037
A method, system and device for creating and managing a variable number of visible cyber coordinates, including at least one of means for generating a random or deterministic number; means for generating variable visible cyber coordinates based on the generated number; and means for employing the ...

27. Sheymov Victor I: Method and system for protection of computer applications and software products againts unauthorized copying. Invicta Networks November 2009: WO 2009/134705
A method, system, and computer program product for protection of an application or program, including making secret a command or commands that are normally fixed in an operating system (OS) and/or a Basic Input/Output System (BIOS); generating values or names for the command or commands; providing ...

28. Sheymov Victor I: Method and system for variable or dynamic classification. INVICTA NETWORKS December 2009: WO 2009/151663
A method, system and device for variable or dynamic classification of users, devices, computers, systems, or information are provided, including at least one of means for sensing one or more inputs, including at least one of an event, a parameter, and time; and means for generating a classification ...

29. SHEYMOV VICTOR I KERSEBOOM Jan Willem Valentijn: Method and systems for secure distribution of content over an insecure medium. INVICTA NETWORKS November 2010: WO 2010/132846
A method, system, and computer program product for secure distribution of content over an insecure medium, including a recipient device configured to receive content; and a sender device configured to request from the recipient device a unique identification associated with the recipient device, ...

30. Sheymov Victor I: System and method for cyber object protection using variable cyber coordinates (vcc). INVICTA NETWORKS February 2011: WO 2011/019662
A method, system, and computer program product for cyber protection using variable cyber coordinates (VCC), including a variable cyber coordinates (VCC) controller unit configured to generate cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected ...

31. SHEYMOV VICTOR I KERSEBOOM Jan Willem Valentijn: System and method for detecting and displaying cyber attacks. Invicta Networks June 2011: WO 2011/068558

Other US patents include:<ref>Patent Genius Directory [http://www.patentgenius.com/inventedby/SheymovVictorIViennaVA.html]</ref>

Inventor: Sheymov; Victor I
Address: Vienna, VA
No. of patents: 12

Patents:
Patent Number Title Of Patent Date Issued
7865732 Method and communications and communication network intrusion protection methods and intrusion a ... January 4, 2011
A method, system and computer readable medium for secure e-commerce communications, including an e-commerce system, including a private system for maintaining confidential information; and a public system for maintaining non-confidential information. The private system provides varia

7802307 Systems and methods for communication protection - September 21, 2010
A communications apparatus and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar ...

7752432 Systems and methods for creating a code inspection system - July 6, 2010
A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in ...

7698444 Systems and methods for distributed network protection - April 13, 2010
By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined...

7650502 Method of communications and communication network intrusion protection methods and intrusion at... January 19, 2010
A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable...

7506166 Method of communications and communication network intrusion protection methods and intrusion at...March 17, 2009
A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable idea...

7406713 Systems and methods for distributed network protection - July 29, 2008
Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party. Specifically, in a protected network system, the protected network is capable of acting a...

7236598 Systems and methods for communication protection - June 26, 2007
A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar...

7197563 Systems and methods for distributed network protection - March 27, 2007
By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined...

7089303 Systems and methods for distributed network protection - August 8, 2006
By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined...

7010698 Systems and methods for creating a code inspection system - March 7, 2006
A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in...

6981146 Method of communications and communication network intrusion protection methods and intrusion at... December 27, 2005
The intrusion protection method and system for a communications network provides address agility wherein the cyber coordinates of a target host are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a management unit which generates...


Mr. Sheymov testified in the United States Congress as an expert witness. He was a speaker at major government and private industry events like [[NSA]], National Defense Industry convention, [[National Science Foundation]] symposium, and a guest lecturer at universities.<ref>"1998 Congressional Hearings, Intelligence and Security Statement by Victor Sheymov, ComShield Corporation before the Joint Economic Committee United States Congress, Wednesday, May 20, 1998, The Low Energy Radio Frequency Weapons Threat to Critical Infrastructure">[http://www.fas.org/irp/congress/1998_hr/sheymov.htm] </ref>
Mr. Sheymov testified in the United States Congress as an expert witness. He was a speaker at major government and private industry events like [[NSA]], National Defense Industry convention, [[National Science Foundation]] symposium, and a guest lecturer at universities.<ref>"1998 Congressional Hearings, Intelligence and Security Statement by Victor Sheymov, ComShield Corporation before the Joint Economic Committee United States Congress, Wednesday, May 20, 1998, The Low Energy Radio Frequency Weapons Threat to Critical Infrastructure">[http://www.fas.org/irp/congress/1998_hr/sheymov.htm] </ref>

Revision as of 16:14, 6 October 2011

Victor Sheymov is an inventor and patent holder of computer security inovations. As a former intelligence official with the Soviet KGB and defector to America[1] in 1980 he was a major contributor to the counter intelligence community of the western nations. His story is well documented through numerous national appearances in media, both television and print, testimony before various Congressional committees, and speaking appearances.

Since becoming a US citizen Mr. Sheymov has been active in the computer security industry with Invicta Networks and other endeavors that address the protection of national governmental and commercial data bases and communications as well as programs to protect children and teens from Internet predators.

Victor Sheymov, scientist, inventor, computer security expert, Russian expert, author and former Soviet KGB Major who defected to the United States in 1980 is the CEO of Invicta Networks, Inc., a Northern Virginia based developer of advanced cyber security technologies. The company was formed in year 2000. Its initial personnel were based on former NSA employees. Invicta Networks developed InvisiLAN® and WizArmorTM technologies among others.

According to the company[2], Invicta Networks technology is based on Variable Cyber Coordinates (VCC) method of communication. InvisiLAN® is a groundbreaking product that proactively defends a company's private network and information assets from internal and external intrusion attempts by making the network cyber-invisible.

InvisiLAN® randomizes virtually all communications parameters i.e. computers’ cyber coordinates, and distributes them only to authorized computers. This is an electronic implementation of the ultimate security principle of “need to know” basis. Furthermore, these parameters are changed rapidly, denying penetrating opportunities to even the most sophisticated attackers. In effect this technology allows protected networks to constantly morph themselves into different states, effectively thwarting cyber reconnaissance and cyber attacks.

Invicta Networks Inc. provides an unprecedented level of network security to any enterprise in any industry needing to protect proprietary data, including financial information, product R&D, customer or patient record, and other kinds of digital assets.

Specializing in cyber security, Mr. Sheymov was granted numerous patents in the United States, European Union, Australia, Japan, India, Korea, and China.[3]

International patents include:[4]

1. Sheymov Victor I: Method of communications and communication network intrusion protection methods and intrusion attempt detection system. Comsec November 2000: WO 2000/070458 (4 worldwide citation)

2. Sheymov Victor I: Systems and methods for creating a code inspection system. Invicta Networks August 2002: WO 2002/065285 (2 worldwide citation)

3. Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. Invicta Networks November 2001: WO 2001/091503 (2 worldwide citation)

4. Sheymov Victor I, Turner Roger B: Systems and methods for distributed network protection. Invicta Networks December 2001: WO 2001/093531 (1 worldwide citation)

5. Sheymov Victor I: Systems and methods for creating a code inspection system. Invicta Networks November 2003: EP1360585

6. Sheymov Victor I: Password protection system and method. Invicta Networks September 2009: GB2458426 A method, system, and device for password protection for a computer or other electronic device are provided, including providing one or more false passwords that outwardly cause the computer or other electronic device to behave as if a correct password was entered and that inwardly cause the ...

7. Sheymov Victor I: Method and system for protecting a communication device from intrusion. Invicta Networks May 2005: EP1533700 The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a management unit (18) which generates a ...

8. Sheymov Victor I: Method and system for protecting a communication device from intrusion. Invicta Networks July 2002: EP1226499 The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a managment unit (18) which generates a ...

9. Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. Invicta Networks February 2003: EP1284092 A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers ...

10. Sheymov Victor I: Method and system for preventing malicious code from being introduced into a protected network. Invicta Networks October 2007: EP1839173 11. Sheymov Victor I: Method and system for network protection against cyber attacks. Invicta Networks December 2008: WO 2008/150786

12. Sheymov Victor I: Networking computers access control system and method. Invicta Networks October 2008: WO 2008/124479

13. Sheymov Victor I: Password protection system and method. Invicta Networks August 2008: WO 2008/103778

14. Sheymov Victor I: Method and system for preventing malicious code from being introduced into a protected network. Invicta Networks June 2006: WO 2006/062934

15. Sheymov Victor I: Systems and methods for distributed network protection. Invicta Networks February 2002: WO 2002/017594

16. Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. Invicta Networks April 2003: KR 1020027015904 A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers ...

17. Sheymov Victor I: Method of communications and communication network intrusion protection methods and intrusion attempt detection system. Invicta Networks April 2002: KR 1020017014589 The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a managment unit (18) which generates a ...

18. Sheymov Victor I: Method and system for preventing malicious code from being introduced into a protected network. Invicta Networks February 2008: CN 200580046202

19. Sheymov Victor I, Turner Roger B: Systems and methods for communication protection. / Systemes et procedes servant a proteger une communication. Invicta Networks November 2001: CA 2409231 A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar identifiers ...

20. Sheymov Victor I: Method of communications and communication network intrusion protection methods and intrusion attempt detection system. / Procede de communication, procedes de protection contre l'intrusion pour reseau de communication, et systeme de detection de tentative d'intrusion. Invicta Networks November 2000: CA 2372662 The intrusion protection method and system for a communication network provides address agility wherein the cyber coordinates of a target host (14) are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a managment unit (18) which generates a ...

21. Sheymov Victor I: Method and system for preventing malicious code from being introduced into a protected network. / Procede et systeme permettant d'empecher un code frauduleux d'etre introduit dans un reseau protege. Invicta Networks June 2006: CA 2590740

22. Sheymov Victor I: 用來防止惡意碼被引進到受保護網路中的方法和系統. / Method and system for preventing malicious code from being introduced into a protected network. Invicta Networks October 2008: HK 1114194

23. Sheymov Victor I, Turner Roger B: Communication protection system and method. Invicta Networks June 2008: JP 2008-136181

24. Sheymov Victor I: Communication method, communication network intrusion protection methods, and intrusion attempt detection system. Invicta Networks July 2007: JP 2007-189725

25. Sheymov Victor I: Method and system for secure data exfiltration from a closed network or system. Invicta Networks September 2009: WO 2009/114436

26. Sheymov Victor I: (ip) Addresses. Invicta Networks October 2009: WO 2009/129037 A method, system and device for creating and managing a variable number of visible cyber coordinates, including at least one of means for generating a random or deterministic number; means for generating variable visible cyber coordinates based on the generated number; and means for employing the ...

27. Sheymov Victor I: Method and system for protection of computer applications and software products againts unauthorized copying. Invicta Networks November 2009: WO 2009/134705 A method, system, and computer program product for protection of an application or program, including making secret a command or commands that are normally fixed in an operating system (OS) and/or a Basic Input/Output System (BIOS); generating values or names for the command or commands; providing ...

28. Sheymov Victor I: Method and system for variable or dynamic classification. INVICTA NETWORKS December 2009: WO 2009/151663 A method, system and device for variable or dynamic classification of users, devices, computers, systems, or information are provided, including at least one of means for sensing one or more inputs, including at least one of an event, a parameter, and time; and means for generating a classification ...

29. SHEYMOV VICTOR I KERSEBOOM Jan Willem Valentijn: Method and systems for secure distribution of content over an insecure medium. INVICTA NETWORKS November 2010: WO 2010/132846 A method, system, and computer program product for secure distribution of content over an insecure medium, including a recipient device configured to receive content; and a sender device configured to request from the recipient device a unique identification associated with the recipient device, ...

30. Sheymov Victor I: System and method for cyber object protection using variable cyber coordinates (vcc). INVICTA NETWORKS February 2011: WO 2011/019662 A method, system, and computer program product for cyber protection using variable cyber coordinates (VCC), including a variable cyber coordinates (VCC) controller unit configured to generate cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected ...

31. SHEYMOV VICTOR I KERSEBOOM Jan Willem Valentijn: System and method for detecting and displaying cyber attacks. Invicta Networks June 2011: WO 2011/068558

Other US patents include:[5]

Inventor: Sheymov; Victor I Address: Vienna, VA No. of patents: 12

Patents: Patent Number Title Of Patent Date Issued 7865732 Method and communications and communication network intrusion protection methods and intrusion a ... January 4, 2011 A method, system and computer readable medium for secure e-commerce communications, including an e-commerce system, including a private system for maintaining confidential information; and a public system for maintaining non-confidential information. The private system provides varia

7802307 Systems and methods for communication protection - September 21, 2010 A communications apparatus and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar ...

7752432 Systems and methods for creating a code inspection system - July 6, 2010 A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in ...

7698444 Systems and methods for distributed network protection - April 13, 2010 By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined...

7650502 Method of communications and communication network intrusion protection methods and intrusion at... January 19, 2010 A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable...

7506166 Method of communications and communication network intrusion protection methods and intrusion at...March 17, 2009 A method, system and computer readable medium for protecting a communications device connected to a communications system against an unauthorized intrusion, including providing a variable identifier to the communications device and entities authorized access thereto. The variable idea...

7406713 Systems and methods for distributed network protection - July 29, 2008 Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party. Specifically, in a protected network system, the protected network is capable of acting a...

7236598 Systems and methods for communication protection - June 26, 2007 A communications system and method is provided to reliably protect communication systems, such as mobile phone systems, from unauthorized use, as well as to make the interception of wireless communication more difficult. Specifically, the static wireless phone number or other similar...

7197563 Systems and methods for distributed network protection - March 27, 2007 By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined...

7089303 Systems and methods for distributed network protection - August 8, 2006 By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined...

7010698 Systems and methods for creating a code inspection system - March 7, 2006 A code inspection system produces a dynamic decoy machine that closely parallels one or more protected systems. The code inspection system can analyze and monitor one or more protected systems, and as those protected systems are updated, altered or modified, the dynamic decoy machine, in...

6981146 Method of communications and communication network intrusion protection methods and intrusion at... December 27, 2005 The intrusion protection method and system for a communications network provides address agility wherein the cyber coordinates of a target host are changed both on a determined time schedule and when an intrusion attempt is detected. The system includes a management unit which generates...

Mr. Sheymov testified in the United States Congress as an expert witness. He was a speaker at major government and private industry events like NSA, National Defense Industry convention, National Science Foundation symposium, and a guest lecturer at universities.[6]

Victor Sheymov is the author of “Tower of Secrets”, a non-fiction book describing Soviet Communist political system, its repressive apparatus, and technical aspect of intelligence. He also authored articles in The Washington Post, Barron's, World Monitor, National Review and other national publications. He appeared at many national news programs including Larry King Live, 48 Hours, Dateline, McNeil-Lehrer, Charlie Rose and the McLaughlin Report. [7] [8]

Victor Sheymov has over 30 years of experience in advanced science. He started his technology career in scientific research involving guidance systems within the Russian "Star Wars" missile defense program. Later Mr. Sheymov worked in the Russian counterpart to the U.S. National Security Agency, serving in a variety of technical and operational positions.

Prior to immigrating to the United States in 1980, Mr. Sheymov had been one of the youngest senior officers in Russian equivalent of the NSA, responsible for coordination of all aspects of the Russian cipher communications security with its outposts abroad. After arrival in the United States he was working for the NSA for a number of years.

Victor Sheymov is a recipient of several prestigious United States awards in intelligence and security.

Victor Sheymov holds an Executive MBA from Emory University and a Master degree from Moscow State Technical University, a Russian equivalent of MIT.


References

  1. ^ Fenton, Ben (9 June 2000). "Ex-KGB major leads US war against hackers". The Daily Telegraph. Retrieved 6 October 2011.
  2. ^ Invicta Networks website[1]
  3. ^ "United States Patent and Trademark Office">[2]
  4. ^ "IPEXL Worldwide Patents Citation">[3]
  5. ^ Patent Genius Directory [4]
  6. ^ "1998 Congressional Hearings, Intelligence and Security Statement by Victor Sheymov, ComShield Corporation before the Joint Economic Committee United States Congress, Wednesday, May 20, 1998, The Low Energy Radio Frequency Weapons Threat to Critical Infrastructure">[5]
  7. ^ "Tower of Secrets", Victor Sheymov, Naval Inst Pr; 1st Edition (October 1993), ISBN-10: 1557507643, ISBN-13: 978-1557507648>[6]
  8. ^ "The New York Times" June 8, 2000 "Ex-Soviet Spy Takes on Internet Mission in U.S., Using Old Skills" By JAMES RISEN>[7]