To solve the problem of restriction in designing inevitably caused by a larger strength of security in the conventional game machines.
A jackpot command for designating a special prize state and control data, the first authentication data for attesting own authenticity and order information for the execution by a CPU are outputted from the main control part 2a. A peripheral part 3a attests the authenticity for the connection state of the main control part using the order information while controlling the execution of a performance or the like based on the jackpot command and outputs the first authentication data. An authentication part 3b authenticates the main control part 2a based on the first authentication data and generates the second authentication data when it is authentic. The peripheral part 3a authenticates the main control part 2a based on the second authentication data generated and makes a notification to the effects if it is determined not to be authentic. This can reduce the burden on the peripheral part as compared with the case of making the peripheral part carry out all of the processing for the authentication, thereby enabling the determination on whether the main control part is authentic or not with a larger strength of security than ever.
JP2003010424 | PACHINKO GAME MACHINE |
JP2017006599 | GAME MACHINE |
JP4753199 | Game machine |
MIZUKAMI HIROSHI
YOKOSHIMA MOTONARI
TRINITY SECURITY SYSTEMS INC
JP2007202740A | 2007-08-16 | |||
JP2005021330A | 2005-01-27 | |||
JP2008279037A | 2008-11-20 | |||
JP2008040916A | 2008-02-21 | |||
JP2009059303A | 2009-03-19 | |||
JP2011005138A | 2011-01-13 | |||
JP2011005140A | 2011-01-13 | |||
JP2011005141A | 2011-01-13 | |||
JP2011005142A | 2011-01-13 | |||
JP2011005143A | 2011-01-13 | |||
JP2011005144A | 2011-01-13 |
Next Patent: GAME MACHINE, AUTHENTICATION METHOD AND PROGRAM