In some embodiments, a command may be used by a host processor to access
certain information from a non-volatile memory, together with a message
authentication code. That information may be utilized to generate a
message authentication code on the processor. Then, in any future
accesses, the message authentication code generated by the host processor
may be compared to the message authentication code from the non-volatile
memory to determine the integrity of data or code that is received from
the non-volatile memory.