VeriFone Vx810 Reference Manual page 73

Hide thumbs Also See for Vx810:
Table of Contents

Advertisement

c
If a matching application file is found, the operating system compares the
signature file's signature against the values stored in the application file's
calculated signature.
d
If these values match, the operating system marks the application file
"authenticated" and allows it to run.
6
Each successfully authenticated executable application file is allowed to run
on the device (otherwise, the executable remains stored in the device's
memory but is not allowed to run).
The following diagram describes the deployment process.
Figure 28
The Deployment Process
F
A
ILE
UTHENTICATION
Introduction to File Authentication
X
V
810 R
G
EFERENCE
UIDE
73

Advertisement

Table of Contents
loading

Table of Contents