A data transmission method is described, where first data is transmitted
to a first processor, then second data based on the first data is
transmitted to a second processor, and a check result is transmitted back
to the first processor. This permits an independent check of data
transmitted to a first processor by a second processor, so that abuse or
prohibited use of first data in the first processor can be prevented.