SECURE COMPUTING DEVICE USING DIFFERENT CENTRAL PROCESSING RESOURCES
First Claim
1. A method for reducing adverse impact of malicious software in a computing device, the method comprises:
- determining to change operation of a program of the computing device; and
when operation of the program is to be changed;
identifying a first processing resource of a plurality of processing resources of the computing device that is currently assigned to execute the program;
selecting a second processing resource of the plurality of processing resources for subsequent execution the program;
ascertaining first execution settings of the program as used by the first processing resource;
facilitating conversion of the first execution settings into second execution settings for the second processing resource; and
de-assigning the first processing resource from executing the program and assigning the second processing resource to execute the program.
3 Assignments
0 Petitions
Accused Products
Abstract
A computing device includes central processing resources, memory, a network interface, and a security control module. The security control module determines when to change operation of a program of the computing device. When the operation of the program is to be changed, the security control module identifies a first processing resource of the central processing resources that is currently assigned to execute the program and selects a second processing resource of the central processing resources for subsequent execution the program. The security control module then ascertains first execution settings of the program as used by the first processing resource and facilitates conversion of the first execution settings into second execution settings for the second processing resource. The security control module then de-assigns the first processing resource from executing the program and assigns the second processing resource to execute the program.
-
Citations
23 Claims
-
1. A method for reducing adverse impact of malicious software in a computing device, the method comprises:
-
determining to change operation of a program of the computing device; and when operation of the program is to be changed; identifying a first processing resource of a plurality of processing resources of the computing device that is currently assigned to execute the program; selecting a second processing resource of the plurality of processing resources for subsequent execution the program; ascertaining first execution settings of the program as used by the first processing resource; facilitating conversion of the first execution settings into second execution settings for the second processing resource; and de-assigning the first processing resource from executing the program and assigning the second processing resource to execute the program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for reducing adverse impact of malicious software in a computing device, the method comprises:
-
determining to change operation of a program of the computing device; and when operation of the program is to be changed, determining whether to change the program and a processing resource of a plurality of processing resources currently assigned to execute the program; when the program and the processing resource are to be changed; facilitating a change of the program to produce a changed program; selecting a second processing resource of the plurality of processing resources to execute the changed program; ascertaining first execution settings of the program as used by a first processing resource for executing the program; facilitating conversion of the first execution settings into second execution settings for the second processing resource; and de-assigning the first processing resource from executing the program and assigning the second processing resource to execute the new program. - View Dependent Claims (10, 11)
-
-
12. A computing device comprises:
-
a plurality of central processing resources; memory operably coupled to at least one of the plurality of central processing resources; a network interface operably coupled to at least one of the plurality of central processing resources; and a security control module operable to; determine to change operation of a program of the computing device; and when operation of the program is to be changed; identify a first processing resource of the plurality of central processing resources that is currently assigned to execute the program; select a second processing resource of the plurality of central processing resources for subsequent execution the program; ascertain first execution settings of the program as used by the first processing resource; facilitate conversion of the first execution settings into second execution settings for the second processing resource; and de-assign the first processing resource from executing the program and assign the second processing resource to execute the program. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computing device comprises:
-
a plurality of central processing resources; memory operably coupled to at least one of the plurality of central processing resources; a network interface operably coupled to at least one of the plurality of central processing resources; and a security control module operable to; determine to change operation of a program of the computing device; and when operation of the program is to be changed, determine whether to change the program and a first processing resource of a plurality of processing resources currently assigned to execute the program; when the program and the processing resource are to be changed; facilitate a change of the program to produce a changed program; select a second processing resource of the plurality of central processing resources to execute the changed program; ascertain first execution settings of the program as currently used by a first processing resource of the plurality of central processing resources for executing the program; facilitate conversion of the first execution settings into second execution settings for the second processing resource; and de-assign the first processing resource from executing the program and assign the second processing resource to execute the changed program. - View Dependent Claims (21, 22, 23)
-
Specification