VeriFone Vx810 Reference Manual page 72

Hide thumbs Also See for Vx810:
Table of Contents

Advertisement

F
A
ILE
UTHENTICATION
Introduction to File Authentication
72
V
X
810 R
G
EFERENCE
The following diagram describes the pre-deployment process.
Figure 27
The Pre-Deployment Process
Deployment Process
In this process:
1
The sponsor provides the application file (from the development process), the
smart card, and smart card PIN (from the pre-deployment process) as inputs
to VeriShield.
2
VeriShield extracts the signer key, signer certificate, and sponsor certificate
from the smart card.
3
VeriShield uses the extracted data, along with the application file, to create a
signature file (*.p7s).
4
VeriShield creates files suitable for downloading from the extracted smart card
data.
5
The signature file, application file, and extracted signer and sponsor
certificates are downloaded onto a deployment device, where the following
actions occur:
a
The device's operating system searches for signature files.
b
If a signature file is found, the operating system searches for a matching
application file.
UIDE

Advertisement

Table of Contents
loading

Table of Contents