The requested data can either comprise code or data that is stored in encrypted form in external memory. (Note that ???data??? is generically used herein in places, including the claims, to refer to code or data.) While the encryption capabilities of the above-described data access control function prevent direct observation and modification of data, the integrity check function adds the ability t