• Solutions
    • Rapid and Comprehensive All-In-One Scanning Solution
    • Identity Document Verification for Onboarding
    • Identity Establishment for Police Forces
  • Products
    • MOBILE SCAN SDK
      • MRZ Scanner & Parser
        • Readme iOS
        • Readme Android
    • MOBILE CHIP SDK
      • eMRTD Connector
        • eMRTD Connector Demo
      • DocVal Server
        • Supported Countries and Organizations
    • KINEGRAM DIGITAL POLICING
      • MOBILE SCAN SDK
      • CHIP VERIFY
      • DOC LIBRARY
    • TRY IT YOURSELF
      • Demonstrators on Identity Verification
  • Use Cases
    • Banking
    • Airlines
    • Hotels
    • Car Rental
    • E-Government
  • About
    • OVD Kinegram
    • Events
    • References
  • Resources
    • Demonstrators
    • Developer Hub
      • MOBILE CHIP SDK online
      • MOBILE CHIP SDK offline
    • Knowledge Base
      • Evaluate our Solution
      • Why Our Solution is Secure
    • Success Stories
      • Enhancing Identity Verification and Customer Onboarding
      • Fast, Reliable, and Universal Data Capture in the Field
    • White Paper
  • Contact
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Access Control When Accessing the Chip of an ID Document

An In-Depth Analysis

Access control mechanisms in ID document chips are crucial for maintaining the confidentiality, integrity, and authenticity of the data stored on the chips. These chips, commonly found in passports, identity cards, and other secure documents, employ a variety of technologies to ensure that sensitive personal information is safeguarded against unauthorized access.

This article explores the primary access control methods used in these contexts, including the use of a password (MRZ or CAN), Basic Access Control (BAC), Password Authenticated Connection Establishment (PACE), and the establishment of Secure Messaging.

Password: MRZ or CAN

Access to the chip on an ID document typically begins with a password-based authentication process. The two main types of passwords used are the Machine Readable Zone (MRZ) and the Card Access Number (CAN):

Machine Readable Zone (MRZ)

This is a standardized format used mainly in travel documents. It includes personal data such as the document holder’s name, passport number, nationality, date of birth, sex, and document expiration date. This data, printed on the identity document, can be visually read and electronically scanned. For electronic reading, several lines at the bottom of the document encode the information, where document number, date of birth and date of expiry are serving as a key to unlock the chip.

Card Access Number (CAN)

This is a shorter numerical code, often used in identity cards or other non-passport travel documents. It serves a similar purpose to the MRZ but is used primarily where MRZ is not applicable. The CAN is typically a six-digit number that must be manually input to gain initial access to the chip.

Kinegram Digital Solutions

Basic Access Control (BAC)

BAC is implemented to protect the communication channel between the chip in the ID document and the reader. Once the MRZ or CAN is correctly entered, BAC uses this information to generate cryptographic keys for securing subsequent data transmissions. BAC is deprecated and has been replaced by the newer protocol Password Authenticated Connection Establishment (PACE). Here’s how BAC works:

Key Derivation

Based on the MRZ or CAN, along with additional data such as the document expiration date and the document holder’s date of birth, a symmetric key is derived.

Authentication and Encryption

This key is then used both to authenticate the data communication and to encrypt the data transmitted between the chip and the reader, ensuring that intercepted communications remain confidential and tamper-proof.

Access Control When Accessing the Chip of an ID Document - Kinegram Digital Solutions

Password Authenticated Connection Establishment (PACE)

An advancement over BAC, PACE provides a more robust security framework for the authentication process between the chip and the reader. PACE can use a PIN (like CAN), a password, or biometric data as the authentication token. The process enhances security in several ways:

Improved Key Agreement

PACE employs a Diffie-Hellman key agreement protocol, which allows the chip and the reader to establish a mutual cryptographic key without the key being transmitted over the air.

Mutual Authentication

Both the chip and the reader authenticate each other, ensuring that each party is legitimate.

Resistance to Eavesdropping and Skimming

The encryption and authentication mechanisms in PACE are designed to be resistant to eavesdropping and skimming attacks, making it significantly harder for unauthorized entities to access the data.

Kinegram Digital Solutions

Establishing Secure Messaging

Once BAC or PACE has been successfully completed, the communication channel between the ID document chip and the reader is considered secure. At this stage, Secure Messaging (SM) is established, which ensures that all subsequent data transmissions are encrypted and integrity-protected. Secure Messaging involves:

Encryption

Data sent from the chip to the reader is encrypted using keys agreed upon during the BAC or PACE process, ensuring that the data cannot be read by others.

Integrity Protection

Each message includes a cryptographic checksum or MAC (Message Authentication Code), which allows the recipient to verify that the message has not been altered during transmission.

Kinegram Digital Solutions

Access Control for Accessing the Chip of an ID Document – Conclusion

The security protocols implemented in ID document chips, including the use of MRZ or CAN, BAC, PACE, and Secure Messaging, play a critical role in protecting personal data against unauthorized access and misuse. These technologies not only secure the data but also ensure that the privacy of the individuals is maintained, bolstering trust in the security of international travel and identity verification processes.

Learn more on Access Control for Accessing the Chip of an ID Document

    First Name *

    Last Name *

    Company *

    Position

    E-Mail *

    Phone *

    Message *

    *

    I agree that my data from the contact form will be collected to answer my request and for marketing and sales purposes. You can find more information in our privacy policy.

    Contact

    White Paper

    Download White Paper "Secure and Efficient Onboarding of new Customers for Better Business Results" Download White Paper Secure and Efficient Onboarding of new Customers for Better Business Results

    Success Story

    Download Success Story "Enhancing Identity Verification and Customer Onboarding" Success Story Enhancing Identity Verification and Customer Onboarding

    RSS Knowledge Base

    • The Importance of Identity Documents and the Future of Integrated Travel Systems – Conclusion and Outlook
      June 18, 2024 In this article, we explore how identity verification is evolving to meet the needs of modern travel within the European Union.
    • Connection of Advanced Passenger Information System (API) to Other Systems
      June 11, 2024 In this article, you will learn how the Advanced Passenger Information System (API) interacts with other border control systems to enhance security and efficiency at the EU’s external borders.
    • Why Mobile Apps are the Customer-Friendliest and Most Secure Option
      June 4, 2024 In this article, you will learn how mobile apps are revolutionizing the way Advanced Passenger Information (API) data is collected.
    • What methods are available for Advanced Passenger Information (API)?
      May 28, 2024 In this article, you will learn about the various methods available for collecting Advanced Passenger Information (API) and how these are integrated into the travel experience from the user's perspective.
    • What is Advanced Passenger Information (API)?
      May 21, 2024 In this article, you will learn how Advanced Passenger Information (API) is transforming modern air travel - from improving border security to ensuring legal compliance across the EU.
    • The Importance of Identity Documents and the Future of Integrated Travel Systems
      May 14, 2024 In this series of articles, you will learn how travel across Europe relies on identity document verification even in a “borderless” Schengen Area, why current systems are facing growing challenges, and how emerging digital travel technologies like the Advanced Passenger Information (API) system are reshaping the future of mobility.
    • Chip-Based Biometrics
      April 9, 2025 This article highlights the importance of chip-based eMRTDs (electronic Machine-Readable Travel Documents) in combating identity theft and deepfakes.
    • Passport-Based Multi-Factor Authentication
      March 26, 2025 In this article, you will learn more about the role of passport-based multi-factor authentication (MFA) in enhancing digital security for high-value transactions.
    • How our Identity Document Verification Solution Integrates Into Onboarding and KYC Processes
      February 26, 2025 In this article, you will learn more on how our Identity Document Verification Solution integrates into onboarding and KYC processes
    • Reduce Fraud with Advanced ID Verification and Electronic Passports
      February 12, 2025 In this article, we explore the escalating challenge of identity fraud in the digital era and how advanced ID verification methods can help businesses stay secure.

    Solutions

    • Solutions

    About

    • OVD Kinegram
    • References
    summ-it.de

    Products

    • Overview
    • MOBILE SCAN SDK
    • MOBILE CHIP SDK
    • KINEGRAM DIGITAL POLICING
    • Demonstrators

    Use Cases

    • Banking
    • Airlines
    • Hotels
    • Car Rental
    • E-Government
    Kinegram Digital Solutions

    © OVD Kinegram AG

    Imprint | Privacy Policy | Image credits
    Privacy Notice | Terms and Conditions

    made by summ-it

    Link to: Quality Features of our Identity Document Verification Solution Link to: Quality Features of our Identity Document Verification Solution Quality Features of our Identity Document Verification SolutionQuality Features of our Identity Document Verification Solution Link to: Ensuring Chip Authenticity in ID Documents Link to: Ensuring Chip Authenticity in ID Documents Ensuring Chip Authenticity in ID Documents - Kinegram Digital SolutionsEnsuring Chip Authenticity in ID Documents
    Scroll to top Scroll to top Scroll to top