In this way, the host application adopts as conditions for establishing authentication recognition of a drive executing application-led data processing using [host-device] type data processing where a drive operates according to commands from an application provided via an interface such as an ATAPI i.e. through data transfer applying a SAC (Secure Authentication Channel) between two parties based