摘要 |
PROBLEM TO BE SOLVED: To solve the problem that restriction on design arises when the strength of security is increased in a conventional game machine.SOLUTION: Besides authenticating the connection device of a CPU, from a main control part 2a, a player-waiting demonstration start-end command and authentication data for authenticating that it is valid are outputted. A peripheral part 3a inputs the output of the main control part 2a, controls the execution of a performance or the like based on the command, and outputs the authentication data. An authentication part 3b determines whether or not the main control part 2a is valid on the basis of the authentication data. When it is determined that the main control part 2a is not valid, the peripheral part 3a reports that effect. Since whether or not the main control part is valid is authenticated in the authentication part, burdens on the peripheral part are reduced, the security is made stronger than before, and whether or not the main control part is valid is determined. |