Mobile user interface system and methods therefor
First Claim
1. A system comprising:
- a first processor;
a non-volatile random access memory coupled to the first processor, the non-volatile random access memory storing program instructions for execution by the first processor, the programming instructions stored only in encrypted form;
an encryption engine coupled to the first processor and coupled to the non-volatile random access memory;
a bridge logic device coupled to the first processor and configured to couple to an external peripheral network bus; and
wherein the encryption engine is configured to decrypt software program instructions stored in the non-volatile random access memory for execution by the first processor.
5 Assignments
0 Petitions
Accused Products
Abstract
A system. At least some embodiments are a system including a first processor and a non-volatile random access memory coupled to the first processor, the non-volatile random access memory storing program instructions for execution by the first processor in which the programming instructions are stored only in encrypted form. The system further includes an encryption engine coupled to the first processor and coupled to the non-volatile random access memory. A bridge logic device coupled is to the processor and configured to couple to an external peripheral network bus. The encryption engine is configured to decrypt software program instructions stored in the non-volatile random access memory for execution by the first processor.
-
Citations
12 Claims
-
1. A system comprising:
-
a first processor; a non-volatile random access memory coupled to the first processor, the non-volatile random access memory storing program instructions for execution by the first processor, the programming instructions stored only in encrypted form; an encryption engine coupled to the first processor and coupled to the non-volatile random access memory; a bridge logic device coupled to the first processor and configured to couple to an external peripheral network bus; and wherein the encryption engine is configured to decrypt software program instructions stored in the non-volatile random access memory for execution by the first processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification