摘要 |
PROBLEM TO BE SOLVED: To provide a game machine which allows fraudulent exchange of a CPU chip provided on a sub control board to be recognized logically by software.SOLUTION: Authentication data acquired in authentication data acquisition means 42 on the side of a main control board 20 is transmitted to a sub control board 30 by authentication data transmission means 43, and when transmitting command data, encrypted command data for which the authentication data is added to the command data is generated, and the encrypted command data is transmitted to the sub control board 30. In the sub control board 30, the received authentication data is stored in a volatile sub board CPU built-in RAM 51, and when the encrypted command data is received, the encrypted command data is decrypted by the authentication data in the sub board CPU built-in RAM 51. When a sub board chip CPU 30A is exchanged to a fraudulent remodeled product, since there is no authentication data in the fraudulent remodeled product, operation control of a performance is not normally performed, and thus the fraudulent exchange of the sub board chip CPU 30A can be easily recognized. |