Specifications
FILE AUTHENTICATION
Introduction to File Authentication
72 V
X
810 REFERENCE GUIDE
The following diagram describes the pre-deployment process.
Figure 27 The Pre-Deployment Process
Deployment Process
In this process:
1 The sponsor provides the application file (from the development process), the
smart card, and smart card PIN (from the pre-deployment process) as inputs
to VeriShield.
2 VeriShield extracts the signer key, signer certificate, and sponsor certificate
from the smart card.
3 VeriShield uses the extracted data, along with the application file, to create a
signature file (*.p7s).
4 VeriShield creates files suitable for downloading from the extracted smart card
data.
5 The signature file, application file, and extracted signer and sponsor
certificates are downloaded onto a deployment device, where the following
actions occur:
a The device’s operating system searches for signature files.
b If a signature file is found, the operating system searches for a matching
application file.