• Solutions
    • Rapid and Comprehensive All-In-One Scanning Solution
    • Identity Document Verification for Onboarding
    • Identity Establishment for Police Forces
  • Products
    • MOBILE SCAN SDK
      • MRZ Scanner Module
      • License Plate Scanner Module
      • 2D Barcode Scanner Module
      • VDS Scanner Module
    • MOBILE CHIP SDK
      • Supported Countries and Organizations
      • MOBILE CHIP SDK online
        • eMRTD Connector
        • DocVal Server
        • Demonstrator
        • Example Result
      • MOBILE CHIP SDK offline
    • KINEGRAM DIGITAL POLICING
      • MOBILE SCAN SDK
      • CHIP VERIFY
      • DOC LIBRARY
      • BANKNOTE SCANNER
    • VDS Bio
    • TRY IT YOURSELF
      • Demonstrators on Identity Verification
  • Use Cases
    • Banking
    • Airlines
    • Hotels
    • Car Rental
    • E-Government
  • About
    • Events
    • News and Press
    • OVD Kinegram
    • References
  • Resources
    • Demonstrators
    • Developer Hub
      • MOBILE SCAN SDK
      • MOBILE CHIP SDK online
      • MOBILE CHIP SDK offline
    • Evaluate our Software
    • Knowledge Base
      • Evaluate our Solution
      • Why Our Solution is Secure
    • Success Stories
      • Enhancing Identity Verification and Customer Onboarding
      • Fast, Reliable, and Universal Data Capture in the Field
      • Strengthening eKYC Excellence and Global Reach
    • White Paper
  • Contact
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Access Control When Accessing the Chip of an ID Document

An In-Depth Analysis

Access control mechanisms in ID document chips are crucial for maintaining the confidentiality, integrity, and authenticity of the data stored on the chips. These chips, commonly found in passports, identity cards, and other secure documents, employ a variety of technologies to ensure that sensitive personal information is safeguarded against unauthorized access.

This article explores the primary access control methods used in these contexts, including the use of a password (MRZ or CAN), Basic Access Control (BAC), Password Authenticated Connection Establishment (PACE), and the establishment of Secure Messaging.

Password: MRZ or CAN

Access to the chip on an ID document typically begins with a password-based authentication process. The two main types of passwords used are the Machine Readable Zone (MRZ) and the Card Access Number (CAN):

Machine Readable Zone (MRZ)

This is a standardized format used mainly in travel documents. It includes personal data such as the document holder’s name, passport number, nationality, date of birth, sex, and document expiration date. This data, printed on the identity document, can be visually read and electronically scanned. For electronic reading, several lines at the bottom of the document encode the information, where document number, date of birth and date of expiry are serving as a key to unlock the chip.

Card Access Number (CAN)

This is a shorter numerical code, often used in identity cards or other non-passport travel documents. It serves a similar purpose to the MRZ but is used primarily where MRZ is not applicable. The CAN is typically a six-digit number that must be manually input to gain initial access to the chip.

Kinegram Digital Solutions

Basic Access Control (BAC)

BAC is implemented to protect the communication channel between the chip in the ID document and the reader. Once the MRZ or CAN is correctly entered, BAC uses this information to generate cryptographic keys for securing subsequent data transmissions. BAC is deprecated and has been replaced by the newer protocol Password Authenticated Connection Establishment (PACE). Here’s how BAC works:

Key Derivation

Based on the MRZ or CAN, along with additional data such as the document expiration date and the document holder’s date of birth, a symmetric key is derived.

Authentication and Encryption

This key is then used both to authenticate the data communication and to encrypt the data transmitted between the chip and the reader, ensuring that intercepted communications remain confidential and tamper-proof.

Access Control When Accessing the Chip of an ID Document - Kinegram Digital Solutions

Password Authenticated Connection Establishment (PACE)

An advancement over BAC, PACE provides a more robust security framework for the authentication process between the chip and the reader. PACE can use a PIN (like CAN), a password, or biometric data as the authentication token. The process enhances security in several ways:

Improved Key Agreement

PACE employs a Diffie-Hellman key agreement protocol, which allows the chip and the reader to establish a mutual cryptographic key without the key being transmitted over the air.

Mutual Authentication

Both the chip and the reader authenticate each other, ensuring that each party is legitimate.

Resistance to Eavesdropping and Skimming

The encryption and authentication mechanisms in PACE are designed to be resistant to eavesdropping and skimming attacks, making it significantly harder for unauthorized entities to access the data.

Kinegram Digital Solutions

Establishing Secure Messaging

Once BAC or PACE has been successfully completed, the communication channel between the ID document chip and the reader is considered secure. At this stage, Secure Messaging (SM) is established, which ensures that all subsequent data transmissions are encrypted and integrity-protected. Secure Messaging involves:

Encryption

Data sent from the chip to the reader is encrypted using keys agreed upon during the BAC or PACE process, ensuring that the data cannot be read by others.

Integrity Protection

Each message includes a cryptographic checksum or MAC (Message Authentication Code), which allows the recipient to verify that the message has not been altered during transmission.

Kinegram Digital Solutions

Access Control for Accessing the Chip of an ID Document – Conclusion

The security protocols implemented in ID document chips, including the use of MRZ or CAN, BAC, PACE, and Secure Messaging, play a critical role in protecting personal data against unauthorized access and misuse. These technologies not only secure the data but also ensure that the privacy of the individuals is maintained, bolstering trust in the security of international travel and identity verification processes.

Learn more on Access Control for Accessing the Chip of an ID Document

    First Name

    Last Name

    Company

    Position

    E-Mail *

    Phone

    Message *

    *

    I agree that my data from the contact form will be collected to answer my request and for marketing and sales purposes. You can find more information in our privacy policy.

    Contact

    White Paper

    Download White Paper "Secure and Efficient Onboarding of new Customers for Better Business Results" Download White Paper Secure and Efficient Onboarding of new Customers for Better Business Results

    Success Story

    Download Success Story "Enhancing Identity Verification and Customer Onboarding" Success Story Enhancing Identity Verification and Customer Onboarding

    Trusted by Industry Analysts

    OVD Kinegram featured in the 2025 Privacy & Compliance PRISM Report OVD Kinegram featured in the 2025 Privacy & Compliance Prism Report

    RSS Knowledge Base

    • Trusted Devices vs. Untrusted Devices
      February 25, 2026 In this article you will learn what makes a device "trusted" or "untrusted" for identity verification, why the distinction matters for security and privacy, which scenarios require offline processing, and how to choose between MOBILE CHIP SDK online and MOBILE CHIP SDK offline based on your operational needs.
    • Trends in Identity Verification 2026
      February 4, 2026 The identity verification ecosystem continues to experience significant transformation. As we move into 2026, authorities, organizations and individuals are facing a complex environment that is strongly shaped by ongoing digitization and convenience, accompanied by more sophisticated fraud and higher assurance demands.
    • Major Performance Upgrades for MOBILE CHIP SDK
      January 13, 2026 A significant update to our MOBILE CHIP SDK brings substantial performance enhancements. Lower latency makes identity verification processes noticeably faster and smoother for end users. A suite of new support features, namely trace and log files as well as a new diagnosis option, is designed to simplify support and monitoring.
    • Performance Upgrade for kinegram.digital’s DIGITAL SEAL iOS app
      January 12, 2026 kinegram.digital has released an updated version of the DIGITAL SEAL iOS app. This tool is a fast and free way to securely and confidently verify identities via mobile phone, and a practical demonstrator for the capabilities of our professional identity verification solutions.
    • EU Entry/Exit System (EES)
      December 10, 2025 In this article, you will learn how the EU Entry/Exit System (EES) fundamentally transforms border management for non-EU travelers and why robust, integration-ready identity document verification technology is essential for businesses developing compliant solutions.

    Solutions

    • Overview

    About

    • OVD Kinegram
    • References

    Products

    • Overview
    • MOBILE SCAN SDK
    • MOBILE CHIP SDK
    • KINEGRAM DIGITAL POLICING
    • Demonstrators

    Use Cases

    • Banking
    • Airlines
    • Hotels
    • Car Rental
    • E-Government
    Kinegram Digital Solutions

    © OVD Kinegram AG

    Imprint | Privacy Policy | Image credits
    Privacy Notice | Terms and Conditions

    Link to: Quality Features of our Identity Document Verification Solution Link to: Quality Features of our Identity Document Verification Solution Quality Features of our Identity Document Verification SolutionQuality Features of our Identity Document Verification Solution Link to: Ensuring Chip Authenticity in ID Documents Link to: Ensuring Chip Authenticity in ID Documents Ensuring Chip Authenticity in ID Documents - Kinegram Digital SolutionsEnsuring Chip Authenticity in ID Documents
    Scroll to top Scroll to top Scroll to top