VeriFone VX 680 Reference Manual page 93

Hide thumbs Also See for VX 680:
Table of Contents

Advertisement

5
Signature files are now processed (after certificate files). The file
authentication module calls the signature checking routine once for each new
signature file it detects. Each *.p7s file is checked as it is detected; a list is
not built and multiple processing passes are not required.
If a signature file is authenticated, "
file is flagged authentic.
If the authentication process fails, "
and the terminal beeps three times (see
continues processing the next signature file until all newly detected
signature files are checked.
If a signature file fails to authenticate and its target file is an executable
code file, such as *.out or *.lib, the executable is not allowed to run
on the terminal on terminal restart.
For data files, font files, and any other files that require authentication to meet
the application's design specification, the application must ensure that these
files successfully authenticate.
While a signature file is being processed, it remains stored in the I: drive file
system of the target file group. The target application file may be redirected
immediately on download to the I: drive or the F: drive.
When the signature file successfully authenticates its target file, it is
automatically moved to the same file system and file group as the target file it
authenticates (that is, if *FA = 1).
The processing routine gives visible and audible indications when a specific
signature file authenticates successfully. The file authentication module does
not halt the process if a signature file fails to authenticate, but continues to the
next step, storing the downloaded files in their final locations in the terminal file
system.
6
Certificate files and signature files are retained in the I: drive file system until
the file authentication process is complete. These special files are then either
deleted or automatically redirected to another file system or file group, as
previously described.
When an application file is authenticated, the operating system sets the file's
read-only attribute to protect it from being modified while stored in terminal
memory. This is also true for a signature file retained in terminal memory.
When a signature file is assigned the read-only attribute, it is no longer
detected as a new signature file by the file authentication module on terminal
restart.
7
When all certificates and signature files are processed and special files are
deleted or redirected as required, the terminal restarts and the *GO application
executes.
P
ERFORMING
File Authentication Requirements
" is displayed and the target
AUTHENTIC
" is displayed for five seconds
FAILED
Figure
12). The routine then
VX 680 R
D
OWNLOADS
93
G
EFERENCE
UIDE

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents