User's Manual

Table Of Contents
INDEX
E
186 VX 675 REFERENCE GUIDE
full and partial downloads 101
full application 102
full operating system 103
host PC 99
operating system files 100
OS files and file authentication 114
partial application 102
partial operating system 103
procedure for performing a direct application
download 119
procedure for performing back-to-back applica-
tion downloads 132
redirecting files during 106
redirecting files to flash memory 106
redirecting files to other file groups 107
redirection of files during downloads 106
back-to-back downloads 109
how operating system files are redirected
109
using DDL.EXE to automatically redirect files
109
restrictions on redirecting files to other file
groups 108
select port 47, 123
store the main application in file Group 1 104
support for multiple applications 104
physical and logical access to file groups 105
terminal configuration settings 101
tools 100
types of download operations 99
use of RAM and flash memory 105
implications for data transfers 105
E
electric current
definition 176
electrical considerations 16
environmental factors 16
error log 67
F
file authentication 110
and downloads 111
authenticating files in specific file groups 91
back-to-back downloads 115
deciding which files to authenticate 83
definition of file authentication 75
deployment process 77, 81
development process 77, 78
digital signature 76
downloading OS files and 114
for non-executable application files 83
guidelines for downloading specific file types 93
planning for successful file authentication 82
pre-deployment process 77, 80
relationship to file groups 91
special files used in the file authentication pro-
cess 76
VeriShield security architecture 83
file authentication certificates
adding new certificates 88
application partition certificate 77
certificate tree 85
control file signing privileges 86
customer sponsor certificate 89
default sponsor certificate 87
definition 76
development certificates 86
downloading a certificate 86
downloading sponsor and signer certificates 87
file size 94
hierarchical relationships 76, 85
how they are authenticated 85
in a development terminal 86
main functions 85
platform root certificate 76
signer certificate 77
sponsor certificate 76
file authentication keys
how private cryptographic keys are conveyed to
customers 76
private cryptographic key 76
public cryptographic key 85
relationship to signature files 76
file authentication process flow
confirming successful authentication 84
effect of failed authentication 84
running the *GO application following authenti-
cation 84
visual and audible indications during processing
84
when the ATTR_NOT_AUTH bit is set 85
file authentication signature files
file size 94
file group password 40
file groups 39
password 40, 45, 70
store main application in Group 1 104
file signing
customer signer PIN 89
how signature files authenticate application files
84
required inputs to the file signing process 88
using the signer private key 77
VeriShield File Signing Tool 94
files