摘要 |
<P>PROBLEM TO BE SOLVED: To detect fraudulent actions such as the exchange of a main control board mounted with a normal main control part and a fraudulent main control board, and to reduce processing loads of a CPU configuring a peripheral part. Ž<P>SOLUTION: A Pachinko game machine includes a main control part 201, an intermediate part 202 and a peripheral part 203. When a control command is a power supply command, the main control part 201 adds first and second authentication data for authenticating the main control part 201 in two stages to the power supply command and supplies them to the intermediate part 202. The intermediate part 202 authenticates the main control part 201 in the first stage using the first authentication data added to the power supply command, adds a first authenticated result and the second authentication data to the power supply command and supplies them to the peripheral part 203. The peripheral part 203 authenticates the main control part 201 in the second stage using the second authentication data added to the power supply command and performs processing corresponding to the first authenticated result or a second authenticated result added to the power supply command. Ž<P>COPYRIGHT: (C)2010,JPO&INPIT Ž
|