VeriFone VX 520 Reference Manual page 81

Hide thumbs Also See for VX 520:
Table of Contents

Advertisement

Deployment Process
In this process:
1
The sponsor provides the application file (from the development process), the
smart card, and smart card PIN (from the pre-deployment process) as inputs
to VeriShield.
2
VeriShield extracts the signer key, signer certificate, and sponsor certificate
from the smart card.
3
VeriShield uses the extracted data, along with the application file, to create a
signature file (*.p7s).
4
VeriShield creates files suitable for downloading from the extracted smart card
data.
5
The signature file, application file, and extracted signer and sponsor
certificates are downloaded into a deployment terminal, where the following
actions occur:
a
The terminal's operating system searches for signature files.
b
If a signature file is found, the operating system then searches for a
matching application file.
c
If a matching application file is found, the operating system compares the
signature file's signature against the values stored in the application file's
calculated signature.
d
If these values match, the operating system marks the application file
"authenticated" and allows it to run.
6
Each successfully authenticated executable application file is allowed to run
on the terminal (otherwise, the executable remains stored in the terminal
memory but is not allowed to run).
F
A
ILE
UTHENTICATION
Introduction to File Authentication
VX 520 R
G
EFERENCE
UIDE
81

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents