摘要 |
PROBLEM TO BE SOLVED: To solve the problem that restriction on design arises when the strength of security is increased in a conventional game machine.SOLUTION: Besides authenticating the connection device of a CPU, a power ON command for specifying the supply of power or specifying initialization and first authentication data for authenticating that it is valid are outputted. A peripheral part 3a controls the execution of processing based on the power ON command, and outputs the first authentication data. An authentication part 3b authenticates the main control part 2a on the basis of the first authentication data, and generates second authentication data when it is valid. The peripheral part 3a authenticates the main control part 2a on the basis of the generated second authentication data. When it is determined that the main control part 2a is not valid, that effect is reported. Burdens on the peripheral part are reduced compared to the case of executing the entire authentication processing in the peripheral part, the security is made stronger than before, and whether or not the main control part is valid is determined. |