How File Authentication Works - VeriFone Vx810 Reference Manual

Hide thumbs Also See for Vx810:
Table of Contents

Advertisement

F
A
ILE
UTHENTICATION
Introduction to File Authentication
How File
Authentication
Works
70
V
X
810 R
G
EFERENCE
File authentication consists of three basic processes:
1
Development: The VeriShield File Signing Tool creates a signature file for
each application file to authenticate.
2
Pre-deployment: An optimal certificate structure is determined, and the
necessary certificates and keys are created.
3
Deployment: The development and pre-deployment processes, once
complete, are used in combination to prepare a device for deployment.
Development Process
In this process:
1
The application developer creates an application file.
2
The developer assigns a name to the application file.
3
The application file becomes a required input for the VeriShield File Signing
Tool (included in the SDK).
4
The default certificate (VXSIGN.CRT) and default key (VXSIGN.KEY)
included in the SDK are inputs for the VeriShield File Signing Tool.
5
Using the application file, default certificate, and default key, the VeriShield
File Signing Tool creates a signature file (*.p7s).
6
The signature file and the original application file are loaded onto a
development device, where the following actions occur:
a
The device's operating system searches for signature files.
b
When a signature file is found, the operating system searches for a
matching application file.
c
When a matching application file is found, the operating system compares
the signature file's signature against the values stored in the application
file's calculated signature.
d
If these values match, the operating system marks the application file
"authenticated" and allows it to run.
7
The application file is tested and debugged.
8
After the application file is fully debugged, it becomes an input for the
deployment process.
UIDE

Advertisement

Table of Contents
loading

Table of Contents