F
ILE
A
UTHENTICATION
Introduction to File Authentication
74
V
X
810 R
EFERENCE
G
UIDE
Planning for File
Authentication
File authentication is an integral part of every V
x
810 device. To safeguard the
device’s logical security, the file authentication module requires that any
executable code file must be successfully authenticated before the operating
system allows it to execute on the device.
Authentication Requirements for Specific File Types
For the purposes of file authentication, executable code files include two file types
that can be recognized by the filename extensions listed below.
Depending on the logical security requirements of specific applications, other
types of files used by an application (that is, non-executable files) must also be
authenticated.
•
Data files (*.dat) that contain sensitive customer information or other data that
must be secure
•
Font files (*.vft or *.fon) may need to be secure to prevent unauthorized text or
messages from being displayed on the screen.
•
Any other type of file used by an application in which the application designer
would like to logically secure using file authentication requirements
Decide Which Files to Authenticate in a Specific Application
The first step in the file authentication process is to determine which files must be
authenticated for an application to meet its design specifications for logical
security under the VeriShield security architecture.
In most cases, application designers make these decisions based on
specifications provided by the device sponsor. Determining which files to
authenticate can be completely transparent to the person or business entity
responsible for signing, downloading, and authenticating an application prior to
deployment.
How (and When) Signature Files Authenticate Their Target Files
Signature files are usually downloaded together with their target application files in
the same data transfer operation. This recommended practice lets you specify
and confirm the logical security status of the V
x
810 each time you perform an
application download.
When the file authentication module detects a new signature file after a device
restart, it locates and attempts to authenticate the target file that corresponds to
the new signature file.
Table 12
Executable File Extensions
File Type
Extension
Compiled and linked application files
*.out
Global function libraries
*.lib
Содержание DUET Vx810
Страница 1: ...VeriFone Part Number 24964 Revision B Vx810 Reference Guide ...
Страница 14: ...VX810 OVERVIEW Features and Benefits 14 VX810 REFERENCE GUIDE ...
Страница 90: ...VeriShield File Signing Tool 90 VX810 REFERENCE GUIDE ...
Страница 130: ...PERFORMING DOWNLOADS Back to Back Application Downloads 130 VX810 REFERENCE GUIDE ...
Страница 148: ...Information Messages 148 VX810 REFERENCE GUIDE ...
Страница 150: ...PORT PINOUTS COM Port 150 VX810 REFERENCE GUIDE ...
Страница 158: ...GLOSSARY 158 VX810 REFERENCE GUIDE ...