摘要 |
<P>PROBLEM TO BE SOLVED: To make the fraudulent analysis of authentication information and alteration using the authentication information be hardly performed by suppressing the increase of a processing load on a CPU in a peripheral part, even when authentication and the alteration are performed by one kind of authentication information. <P>SOLUTION: When kind information is data for changing an expectation value, a main control part generates data for changing an expectation value that changes an expectation value, generates authentication information having the data for changing the expectation value, transmits the authentication information to a post-stage part, and subsequently, changes an inspection value according to the detection of a detection target control command. Further, when the data kind of post-stage side kind information is data for changing an expectation value, the post-stage part compares data for authentication of the authentication information received from the main control part with two kinds of expectation values, thereby to generate post-stage authentication result data that indicate the authentication result of the main control part, based on a determination result, and to transmit the post-stage authentication result data to the peripheral part. When the data kind of the post-stage side kind information is the data for changing the expectation value, the post-stage part changes expectation values according to the detection of the detection target control command, on the basis of the data for changing the expectation value from the main control part. <P>COPYRIGHT: (C)2012,JPO&INPIT |