Specifications

FILE AUTHENTICATION
Introduction to File Authentication
VX 520 R
EFERENCE GUIDE 81
Deployment Process
In this process:
1 The sponsor provides the application file (from the development process), the
smart card, and smart card PIN (from the pre-deployment process) as inputs
to VeriShield.
2 VeriShield extracts the signer key, signer certificate, and sponsor certificate
from the smart card.
3 VeriShield uses the extracted data, along with the application file, to create a
signature file (*.p7s).
4 VeriShield creates files suitable for downloading from the extracted smart card
data.
5 The signature file, application file, and extracted signer and sponsor
certificates are downloaded into a deployment terminal, where the following
actions occur:
a The terminal’s operating system searches for signature files.
b If a signature file is found, the operating system then searches for a
matching application file.
c If a matching application file is found, the operating system compares the
signature file’s signature against the values stored in the application file’s
calculated signature.
d If these values match, the operating system marks the application file
“authenticated” and allows it to run.
6 Each successfully authenticated executable application file is allowed to run
on the terminal (otherwise, the executable remains stored in the terminal
memory but is not allowed to run).