| CPC G06F 21/44 (2013.01) [G06F 3/062 (2013.01); G06F 3/0655 (2013.01); G06F 3/0679 (2013.01)] | 9 Claims |

|
1. An information processing apparatus capable of connecting a storage device having a plurality of kinds of interfaces, the information processing apparatus comprising:
a processor that executes programs and controls communication connection; and
a built-in memory that retains the programs and data,
wherein when the storage device is physically connected, a plurality of communication channels via the plurality of kinds of interfaces are formed between the storage device and the information processing apparatus;
wherein the plurality of communication channels include:
a first communication channel via a first interface not directly linked to the built-in memory and incapable of accessing the built-in memory even when the communication connection is established; and
a second communication channel via a second interface directly linked to the built-in memory and capable of accessing the built-in memory when the communication connection is established;
wherein when the storage device is physically connected and at a specified timing when the communication connection via the second communication channel is not established, the processor:
executes authenticity verification processing for verifying authenticity of the storage device on the basis of information acquired from the storage device by using the first communication channel; and
permits establishment of the communication connection via the second communication channel when the authenticity is confirmed by the authenticity verification processing,
wherein encrypted authentication information which is obtained by encrypting specific information of the storage device is written to the storage device in advance; and
wherein in the authenticity verification processing, the processor verifies the authenticity by acquiring the specific information and the encrypted authentication information in the storage device via the first communication channel and comparing information obtained by decrypting the encrypted authentication information with the specified information.
|