These types of protections schemes are also of limited value, as the keys or sequences are known or remain accessible to such programs or utilities. [0006] Storage of important data to read-only memory protects the data, but precludes such functions as software update via download, over-the-air (OTA) provisioning on wireless communication devices, and similar functions requiring writable memory.