Patents by Inventor Terrence Ming Swee Heng

Terrence Ming Swee Heng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10275593
    Abstract: A computing device includes central processing resources, memory, a network interface, and a security control module. The security control module determines when to change operation of a program of the computing device. When the operation of the program is to be changed, the security control module identifies a first processing resource of the central processing resources that is currently assigned to execute the program and selects a second processing resource of the central processing resources for subsequent execution the program. The security control module then ascertains first execution settings of the program as used by the first processing resource and facilitates conversion of the first execution settings into second execution settings for the second processing resource. The security control module then de-assigns the first processing resource from executing the program and assigns the second processing resource to execute the program.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: April 30, 2019
    Assignee: UNIQUESOFT, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Patent number: 9361456
    Abstract: A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module determines when to change a program of the computing device. When the program is to be changed, the security control module accesses a library of programs that includes a plurality of versions of the program and selects one of the plurality of versions of the program. The security control module then updates an active program list to include the selected version of the program. When the program is evoked, the central processing resource uses the selected version of the program such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of the malicious software.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: June 7, 2016
    Assignee: UNIQUESOFT, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Patent number: 9104862
    Abstract: A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module is operable to determine to change at least a portion of a program of the computing device. When the program, or portion thereof, is to be changed, the security control module sends a request to a software generation module for a new version of the program, or portion thereof. The security control module then receives the new version of the program, or portion thereof, and replaces, within the memory, the program, or portion thereof, with the new version of the program, or portion thereof. When the program is evoked, the central processing resource uses the new version of the program, or portion thereof, such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of malicious software.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: August 11, 2015
    Assignee: UniqueSoft, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Publication number: 20140298452
    Abstract: A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module is operable to determine to change at least a portion of a program of the computing device. When the program, or portion thereof, is to be changed, the security control module sends a request to a software generation module for a new version of the program, or portion thereof. The security control module then receives the new version of the program, or portion thereof, and replaces, within the memory, the program, or portion thereof, with the new version of the program, or portion thereof. When the program is evoked, the central processing resource uses the new version of the program, or portion thereof, such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of malicious software.
    Type: Application
    Filed: April 1, 2013
    Publication date: October 2, 2014
    Applicant: UNIQUESOFT, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Publication number: 20140298454
    Abstract: A computing device includes central processing resources, memory, a network interface, and a security control module. The security control module determines when to change operation of a program of the computing device. When the operation of the program is to be changed, the security control module identifies a first processing resource of the central processing resources that is currently assigned to execute the program and selects a second processing resource of the central processing resources for subsequent execution the program. The security control module then ascertains first execution settings of the program as used by the first processing resource and facilitates conversion of the first execution settings into second execution settings for the second processing resource. The security control module then de-assigns the first processing resource from executing the program and assigns the second processing resource to execute the program.
    Type: Application
    Filed: April 1, 2013
    Publication date: October 2, 2014
    Applicant: UNIQUESOFT, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Publication number: 20140298453
    Abstract: A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module determines when to change a program of the computing device. When the program is to be changed, the security control module accesses a library of programs that includes a plurality of versions of the program and selects one of the plurality of versions of the program. The security control module then updates an active program list to include the selected version of the program. When the program is evoked, the central processing resource uses the selected version of the program such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of the malicious software.
    Type: Application
    Filed: April 1, 2013
    Publication date: October 2, 2014
    Applicant: UNIQUESOFT,LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis