Hapter; File Authentication; Introduction To File Authentication; The Verifone Certificate Authority - VeriFone Vx810 Reference Manual

Hide thumbs Also See for Vx810:
Table of Contents

Advertisement

C
5

HAPTER

File Authentication

This chapter discusses the VeriShield file authentication security architecture,
VeriShield file authentication module, and the organizational infrastructure that
supports it (see
Introduction to File
Authentication).
This chapter also explains how the file authentication process may affect the tasks
normally performed by application programmers, system deployers, site
x
administrators, or entities authorized to download files to the V
810 (see
File
Authentication and the File
System).
Lastly, this chapter explains how to generate the signature files required to
x
perform downloads and authenticate files on the V
810 using the VeriShield File
Signing Tool (see
VeriShield File Signing
Tool).
In
Chapter
6, the topic of file authentication is also discussed in the context of
specific file download procedures.
Introduction to
x
The V
810 uses the VeriShield security architecture, which has both physical and
File
logical components. The logical security component of the VeriShield architecture,
Authentication
which is part of the operating system software, is called the file authentication
module.
File authentication is a secured process for authenticating files using digital
signatures, cryptographic keys, and digital certificates. This process makes it
x
possible for the sponsor of a V
810 to logically secure access to the device by
controlling who is authorized to download application files to that device. It verifies
the file's origin, sender's identity, and integrity of the file's information.
The VeriFone
To manage the tools and processes related to the file authentication module of the
Certificate Authority
VeriShield security architecture, VeriFone has established a centralized VeriFone
Certificate Authority, or VeriFone CA. This agency is responsible for managing
keys and certificates. The VeriFone CA uses an integrated set of software tools to
generate and distribute digital certificates and private cryptographic keys to
x
customers who purchase the V
810.
X
67
V
810 R
G
EFERENCE
UIDE

Advertisement

Table of Contents
loading

Table of Contents