How File Authentication Works - VeriFone P200 Reference Manual

Hide thumbs Also See for P200:
Table of Contents

Advertisement

NOTE
Only one sponsor certificate is permitted per PINpad.
The required sponsor and signer certificates must either have been previously
downloaded and authenticated on the PINpad, or they must be downloaded
together with the new signature and target files to authenticate correctly.
Signer Private Keys Are Issued to Secure the File Signing Process
Signer private keys are loaded onto a smart card. This smart card is securely
delivered to the business entity that the PINpad sponsor has authorized to sign,
download, and authenticate applications to run on the sponsor's PINpad.
The Verifone CA can also issue additional sets of sponsor and signer certificates,
signer private keys to support multiple sponsors, and multiple signers for a
specific platform.
To establish the logical security of applications to download to a PINpad, the
designated signer uses the signer private key issued by the Verifone CA as this is
a required input to the VeriShield File Signing Tool. Every signature file contains
information about the signer private key used to sign it.
When a signature file is generated using a signer private key. Successful
authentication depends on whether the signer private key used to sign the target
file matches the signer certificate stored in the PINpad's certificate tree.
How File
File authentication consists of three basic processes:
Authentication
1
Works
2
3
Signer certificate: Certifies the right to sign and authenticate files for PINpads
belonging to the sponsor.
A signer certificate is authenticated under the authority of a higher-level client
certificate (the sponsor certificate).
Certificate Request: An optimal certificate structure is determined, and the
necessary certificates and keys are created.
Development: The file signing software tool creates a signature file for each
application file to authenticate.
Deployment: The development and pre-deployment processes, once
complete, are used in combination to prepare a PINpad for deployment.
F
A
ILE
UTHENTICATION
Introduction to File Authentication
P200/P400 R
G
EFERENCE
UIDE
37

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

P400P200 plusP400 plus

Table of Contents