发明名称 GAME MACHINE AND AUTHENTICATION METHOD THEREOF
摘要 <P>PROBLEM TO BE SOLVED: To make the fraudulent analysis of authentication information and alteration using the authentication information be hardly performed by suppressing the increase of a processing load on a CPU in a peripheral part, even when authentication and the alteration are performed by one kind of authentication information. <P>SOLUTION: When kind information is data for changing an expectation value, a main control part generates data for changing an expectation value that changes an expectation value, generates authentication information having the data for changing the expectation value, transmits the authentication information to a post-stage part, and subsequently, changes an inspection value according to the detection of a detection target control command. Further, when the data kind of post-stage side kind information is data for changing an expectation value, the post-stage part compares data for authentication of the authentication information received from the main control part with two kinds of expectation values, thereby to generate post-stage authentication result data that indicate the authentication result of the main control part, based on a determination result, and to transmit the post-stage authentication result data to the peripheral part. When the data kind of the post-stage side kind information is the data for changing the expectation value, the post-stage part changes expectation values according to the detection of the detection target control command, on the basis of the data for changing the expectation value from the main control part. <P>COPYRIGHT: (C)2012,JPO&INPIT
申请公布号 JP2012152500(A) 申请公布日期 2012.08.16
申请号 JP20110016365 申请日期 2011.01.28
申请人 KYORAKU SANGYO KK;TRINITY SECURITY SYSTEMS INC 发明人 WATANABE NAOYUKI;MIZUKAMI HIROSHI;YOKOSHIMA MOTONARI
分类号 A63F7/02 主分类号 A63F7/02
代理机构 代理人
主权项
地址