System and method for cyber object protection using variable cyber coordinates (vcc)

US20120137345A1

United States Inventor Victor I. Sheymov Current Assignee Invicta Networks Inc

A method, system, and computer program product for cyber protection using variable cyber coordinates (VCC), including a variable cyber coordinates (VCC) controller unit configured to generate cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected routers; and the VCC controller unit configured to communicate the generated cyber coordinates to the protected routers with or without encryption and/or authentication. At a predetermined time interval or based on a command from the VCC controller unit, the routers and their respective control units (CU) are configured to change their cyber coordinates together or separately, to cyber coordinates newly generated by the VCC controller unit according to the VCC protocol.

1. A system for cyber protection using variable cyber coordinates (VCCs), the system comprising: a variable cyber coordinates (VCC) controller unit configured to generate cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected routers; and the VCC controller unit configured to communicate the generated cyber coordinates to the protected routers with or without encryption and/or authentication, wherein at a predetermined time interval or based on a command from the VCC controller unit, the routers and their respective control units (CU) are configured to change their cyber coordinates together or separately, to cyber coordinates newly generated by the VCC controller unit according to the VCC protocol. 2. A method for cyber protection using variable cyber coordinates (VCCs), the method comprising: generating by a variable cyber coordinates (VCC) controller unit cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected routers; communicating by the VCC controller unit the generated cyber coordinates to the protected routers with or without encryption and/or authentication; and at a predetermined time interval or based on a command from the VCC controller unit, changing by the routers and their respective control units (CU) their cyber coordinates together or separately, to cyber coordinates newly generated by the VCC controller unit according to the VCC protocol. 3. A computer program for cyber protection using variable cyber coordinates (VCCs), and including one or more computer readable instructions embedded on a computer readable medium and configured to cause one or more computer processors to perform the steps of: generating by a variable cyber coordinates (VCC) controller unit cyber coordinates based on a VCC protocol for respective control circuits (CC) of one or more protected routers; communicating by the VCC controller unit the generated cyber coordinates to the protected routers with or without encryption and/or authentication; and at a predetermined time interval or based on a command from the VCC controller unit, changing by the routers and their respective control units (CU) their cyber coordinates together or separately, to cyber coordinates newly generated by the VCC controller unit according to the VCC protocol.

Victor Sheymov's Blog on cyber security and intelligence