VeriFone Vx810 Reference Manual page 77

Hide thumbs Also See for Vx810:
Table of Contents

Advertisement

A development set of higher-level certificates is downloaded onto each
x
V
810 device upon manufacture. When you take a new V
shipping carton, certificate data is already stored in the device's certificate tree. In
this just-out-of-the-box condition, the V
Typically, a sponsor requests an additional set of digital certificates from the
VeriFone CA to establish sponsor and signer privileges. This additional set of
certificates are downloaded onto the V
deployment and replaces the default certificate. When this procedure is complete,
x
the V
810 is called a deployment device.
Adding New Certificates
When you add a new certificate file to a V
detects it by filename extension (*.crt). On restart, the device attempts to
authenticate the certificate under the authority of the resident higher-level
certificate stored in the device's certificate tree or one being downloaded with the
new certificate.
In a batch download containing multiple certificates, each lower-level certificate
must be authenticated under an already-authenticated, higher-level certificate.
Whether or not the data a new certificate contains is added to the device's
certificate tree depends on if it is successfully authenticated. The following points
explain how certificates are processed:
If a new certificate is successfully authenticated, the information it contains is
automatically stored in the device's certificate tree. The corresponding
certificate file (*.crt) is deleted from that file group's SRAM.
If the relationship between the new certificate and an existing higher-level
certificate cannot be verified, the authentication procedure for the new
certificate fails. In this case, the certificate information is not added to the
certificate tree and the failed certificate file (usually ~400 bytes) is retained in
the application memory.
Certificate Tree Restoration
The Verix V OS in the V
certificate tree is restored, any custom certificate is cleared. The DUKPT PIN
entry limit bucket is also cleared.
x
810 is called a development device.
x
810 when the device is being prepared for
x
810, the file authentication module
x
810 supports certificate tree restoration. When a
F
A
ILE
UTHENTICATION
Introduction to File Authentication
x
810 device out of its
X
V
810 R
G
EFERENCE
UIDE
77

Advertisement

Table of Contents
loading

Table of Contents