Processing module operating methods, processing modules, and communications systems
First Claim
1. A method comprising:
- requesting, by a processor resident in a processing module communicatively coupled to a wireless communications device via a communication interface resident in the processing module, retrieval of encrypted code from a source of encrypted code communicatively coupled to the wireless communications device, the source being external to a memory of the wireless communications device, wherein the wireless communications device is unable to decrypt the encrypted code and the processor rejects messages from the wireless communications device other than messages containing user interaction data or the encrypted code;
receiving, by the processing module via the communication interface, the encrypted code from the wireless communications device responsively to the request;
decrypting, by the processor, the encrypted code, wherein the wireless communications device is unable to access decrypted code; and
executing, by the processor resident in the processing module, the decrypted code.
4 Assignments
0 Petitions
Accused Products
Abstract
A processing module operating method includes using a processing module physically connected to a wireless communications device, requesting that the wireless communications device retrieve encrypted code from a web site and receiving the encrypted code from the wireless communications device. The wireless communications device is unable to decrypt the encrypted code. The method further includes using the processing module, decrypting the encrypted code, executing the decrypted code, and preventing the wireless communications device from accessing the decrypted code. Another processing module operating method includes using a processing module physically connected to a host device, executing an application within the processing module, allowing the application to exchange user interaction data communicated using a user interface of the host device with the host device, and allowing the application to use the host device as a communications device for exchanging information with a remote device distinct from the host device.
34 Citations
16 Claims
-
1. A method comprising:
-
requesting, by a processor resident in a processing module communicatively coupled to a wireless communications device via a communication interface resident in the processing module, retrieval of encrypted code from a source of encrypted code communicatively coupled to the wireless communications device, the source being external to a memory of the wireless communications device, wherein the wireless communications device is unable to decrypt the encrypted code and the processor rejects messages from the wireless communications device other than messages containing user interaction data or the encrypted code; receiving, by the processing module via the communication interface, the encrypted code from the wireless communications device responsively to the request; decrypting, by the processor, the encrypted code, wherein the wireless communications device is unable to access decrypted code; and executing, by the processor resident in the processing module, the decrypted code. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A processing module comprising:
-
memory configured to store a set of instructions executable by processing circuitry; a communication interface configured to be communicatively coupled to a wireless communications device; and the processing circuitry configured to retrieve and execute the set of instructions to request that the wireless communication device retrieve encrypted code from a source of encrypted code communicatively coupled to the wireless communications device, the source being external to a memory of the wireless communications device, receive the encrypted code from the wireless communications device via the communication interface responsively to the request, use the decryption program stored in the memory to decrypt encrypted code received from the wireless communication device, execute the decrypted code, and reject messages from the wireless communications device other than messages containing user interaction data or the encrypted code, wherein the wireless communications device is unable to decrypt the encrypted code or access the decrypted code. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
Specification