F
ILE
A
UTHENTICATION
Introduction to File Authentication
V
X
810 R
EFERENCE
G
UIDE
73
c
If a matching application file is found, the operating system compares the
signature file’s signature against the values stored in the application file’s
calculated signature.
d
If these values match, the operating system marks the application file
“authenticated” and allows it to run.
6
Each successfully authenticated executable application file is allowed to run
on the device (otherwise, the executable remains stored in the device’s
memory but is not allowed to run).
The following diagram describes the deployment process.
Figure 28
The Deployment Process
Содержание DUET Vx810
Страница 1: ...VeriFone Part Number 24964 Revision B Vx810 Reference Guide ...
Страница 14: ...VX810 OVERVIEW Features and Benefits 14 VX810 REFERENCE GUIDE ...
Страница 90: ...VeriShield File Signing Tool 90 VX810 REFERENCE GUIDE ...
Страница 130: ...PERFORMING DOWNLOADS Back to Back Application Downloads 130 VX810 REFERENCE GUIDE ...
Страница 148: ...Information Messages 148 VX810 REFERENCE GUIDE ...
Страница 150: ...PORT PINOUTS COM Port 150 VX810 REFERENCE GUIDE ...
Страница 158: ...GLOSSARY 158 VX810 REFERENCE GUIDE ...