. . . "Accordingly, what is needed is a device that embeds the encryption functionality of the conventional computing device without the limitations of conventional techniques for outputting decryption information." .