c
If a matching application file is found, the operating system compares the
signature file's signature against the values stored in the application file's
calculated signature.
d
If these values match, the operating system marks the application file
"authenticated" and allows it to run.
6
Each successfully authenticated executable application file is allowed to run
on the device (otherwise, the executable remains stored in the device's
memory but is not allowed to run).
The following diagram describes the deployment process.
Figure 28
The Deployment Process
F
A
ILE
UTHENTICATION
Introduction to File Authentication
X
V
810 R
G
EFERENCE
UIDE
73