"host and determining whether or not there is a data update command by the system software; requesting an authentication for updating data stored in the first logic area by the system software when the update command is received; and receiving data for update from the host or the server and updating the data in the first logic area by the system software if the authentication is allowed. 84." . . . .