An architecture, system and method for operating on encrypted and/or
hidden information (e.g., code and/or data). The invention enables
creators, owners and/or distributors of proprietary code to keep such
code inaccessible to users and user-controlled software programs. A
memory architecture includes first and second protected memory spaces,
respectively storing operating system instructions and a decrypted
version of the encrypted information. The first protected memory space
may further store a table linking the locations of the encrypted and/or
hidden, decrypted information with a decryption and/or authorization key.
The system includes the memory architecture and a processor for executing
instructions, and the method loads, stores and operates on the encrypted
and/or hidden information according to the memory architecture
functionality and/or constraints.