• Solutions
    • Rapid and Comprehensive All-In-One Scanning Solution
    • Identity Document Verification for Onboarding
    • Identity Establishment for Police Forces
  • Products
    • MOBILE SCAN SDK
      • Readme iOS
      • Readme Android
      • MRZ Scanner Module
      • License Plate Scanner Module
      • 2D Barcode Scanner Module
      • VDS Scanner Module
    • MOBILE CHIP SDK
      • MOBILE CHIP SDK offline
      • eMRTD Connector
        • eMRTD Connector Demo
      • DocVal Server
        • Supported Countries and Organizations
        • DocVal Server Example eMRTD Result
    • KINEGRAM DIGITAL POLICING
      • MOBILE SCAN SDK
      • CHIP VERIFY
      • DOC LIBRARY
      • BANKNOTE SCANNER
    • TRY IT YOURSELF
      • Demonstrators on Identity Verification
  • Use Cases
    • Banking
    • Airlines
    • Hotels
    • Car Rental
    • E-Government
  • About
    • OVD Kinegram
    • Events
    • References
  • Resources
    • Demonstrators
    • Developer Hub
      • MOBILE CHIP SDK online
      • MOBILE CHIP SDK offline
    • Knowledge Base
      • Evaluate our Solution
      • Why Our Solution is Secure
    • Success Stories
      • Enhancing Identity Verification and Customer Onboarding
      • Fast, Reliable, and Universal Data Capture in the Field
    • White Paper
    • Evaluate our Software
  • Contact
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Accessing Data from the Chip on ID Documents

Technical Aspects and Protocols

Modern ID documents, such as electronic passports (ePassports) and national ID cards, incorporate embedded microchips that store biometric and biographic data securely. These chips facilitate machine-readable travel documents under standards set by the International Civil Aviation Organization (ICAO). Accessing data stored on these chips involves several key components and protocols, each crucial for ensuring data integrity and security.

This article will delve into the details of the Document Security Object (SOD), the various Data Groups (DG1-DG20), the Attributes of the chip (ATR), the Card Access File, and the Common Object Model (COM).

Document Security Object (SOD)

The SOD* is a fundamental security feature in ID document chips. It contains the digital signature of all the data stored on the chip, ensuring the integrity and authenticity of the data. The digital signature is typically generated using a certificate issued by a trusted certificate authority (CA). This certificate, along with the hash values of the data groups, are stored within the SOD. When data is accessed from the chip, the SOD allows the validating system to confirm that the data has not been altered since the document was issued.

Kinegram Digital Solutions

Data Groups (DG)

The information on an ID document chip is organized into specific Data Groups (DGs). Here are the key data groups and their contents:

DG1 – Machine Readable Zone (MRZ) Information

This contains the data printed in the MRZ of the travel document, such as the document holder’s name, document number, nationality, and date of birth. This information is critical for initial verification and is used to login to the chip.

DG2 – Biometric Information

Typically holds the facial image of the document holder, used for biometric checks at border controls.

DG3 (optional) – Fingerprints

This group is used to store the fingerprint images of the document holder, usually required by countries implementing higher security measures. To be able to read the contents of this DG, special certificates are required.

DG4 (optional) – Iris Data

DG4 stores iris scan information, which some countries use for advanced biometric verification. To access the contents of this DG, special certificates are required.

DG5 (optional) – Displayed Portrait

Contains one or more portrait of the document holder used for visual inspection, which can differ from the biometrically captured image in DG2.

DG6 (optional) – Specific national applications

This group is reserved for future use or for specific national applications. It is not universally defined and vary by the issuing country.

DG7 (optional) – Signature or Usual Mark

Image of the Signature or Usual Mark

DG8 to DG10 (optional)

These groups are reserved for future use or for specific national applications. They are not universally defined and vary by the issuing country.

DG11 (optional) – Personal Data Additional Details

Stores additional personal details like the document holder’s profession, titles, or proof marks.

DG12 (optional) – Additional Document Details

Contains information about the issuing authority or other administrative entries related to the document issuance.

DG13 (optional) – Optional Details

Used for optional or additional data not covered by other groups, again varying by country.

DG14 (optional) – Cryptographic Info

Holds public key information and security objects, enhancing the security of the communication between the chip and the reader.

DG15 (optional) – Active Authentication Public Key

Contains the public key used for Active Authentication, designed to prove the authenticity of the chip and combat forgery.

Each DG is protected and can only be accessed once proper authentication mechanisms, like Basic Access Control (BAC) or Password Authenticated Connection Establishment (PACE), are successfully executed.

Accessing Data from the Chip on ID Documents - Kinegram Digital Solutions

Answer To Reset (ATR)

The Answer To Reset (ATR) or ATR/Info is a standard response from a smart card microprocessor (including the chips in ID documents) upon connection with a reader. It provides essential information about the card, including supported protocols and operational parameters necessary for the communication setup. The ATR helps in establishing the physical and logical parameters to be used in subsequent communications.

Kinegram Digital Solutions

Card Access File (CAF)

The Card Access File (CAF) is crucial for defining the security conditions under which the chip’s data can be accessed. It specifies the protocols supported by the chip (e.g., T=1, T=CL), the type of secure messaging supported, and the access rules for each data group. This file is pivotal in setting up the security architecture for data access and ensuring compliance with international standards for protected data transmission.

Kinegram Digital Solutions

Common Object Model (COM)

The Common Object Model (COM) contains metadata about the logical data structure on the chip. Typically, it includes a directory of the data groups available on the chip and their respective identifiers. The COM plays an essential role in guiding the reading devices on how to parse and interact with the data correctly and efficiently. This directory facilitates quick access to specific data groups by providing direct pointers to their locations on the chip.

Kinegram Digital Solutions

Accessing Data From the Chip on ID Documents – Conclusion

The protocols and structures described above outline a robust framework for securely accessing and processing the sensitive data stored on ID document chips. These mechanisms ensure that the data can only be accessed by authorized entities and protect against unauthorized data tampering and interception. As security threats evolve, these systems must be continually updated and tested to safeguard personal information against emerging vulnerabilities.

* Source: https://www.icao.int/publications/Documents/9303_p10_cons_en.pdf

Learn more on Accessing Data From the Chip on ID Documents

    First Name

    Last Name

    Company

    Position

    E-Mail *

    Phone

    Message *

    *

    I agree that my data from the contact form will be collected to answer my request and for marketing and sales purposes. You can find more information in our privacy policy.

    Contact

    White Paper

    Download White Paper "Secure and Efficient Onboarding of new Customers for Better Business Results" Download White Paper Secure and Efficient Onboarding of new Customers for Better Business Results

    Success Story

    Download Success Story "Enhancing Identity Verification and Customer Onboarding" Success Story Enhancing Identity Verification and Customer Onboarding

    RSS Knowledge Base

    • Why our Mobile Scanning SDK is Secure
      October 22, 2025 In this article you will learn why the MOBILE SCAN SDK provides uncompromising security through on-device processing that eliminates data transmission risks while maintaining exceptional performance. You will discover how our privacy-by-design architecture ensures complete data sovereignty and regulatory compliance without requiring any external dependencies. Furthermore, you will also see how straightforward […]
    • White Label Mobile Scanning Solution
      October 8, 2025 In this article you will learn how the MOBILE SCAN SDK as white label mobile scanning solution enables companies to integrate advanced scanning functionality seamlessly into their existing app without compromising brand consistency or user experience. You will discover why purchasing a ready-made solution is more advantageous than developing scanning capabilities in-house, […]
    • FAQ on Identity Document Checks
      August 27, 2025 In this FAQ on identity document checks, we address the most important questions about modern identity verification processes, covering everything from chip-based authentication and MRZ reading to SDK integration and data protection compliance.
    • What are Identity Document Checks – and Why Are They Crucial?
      August 20, 2025 In this article, you'll learn how identity document checks have evolved into an essential part of secure digital onboarding, compliance and fraud prevention. You’ll also discover how technologies such as MRZ scanning and chip-based verification enhance fraud prevention, streamline user identification, and meet international regulatory standards.
    • Build Secure, Privacy-First Mobile Scanning Solutions in no Time
      August 6, 2025 In this article you will learn how the MOBILE SCAN SDK enables rapid development of secure mobile scanning solutions with built-in privacy and seamless integration capabilities. You will discover how this powerful and field-proven SDK supports multi-platform development while meeting the highest compliance standards, as evidenced by its successful implementation at the […]
    • Why one Scan SDK is all you Need
      July 9, 2025 In this article you will learn how consolidating multiple scanning technologies - such as smartphone cameras, mobile apps, ID card readers, license plate scanners, and barcode scanners - into a single unified scan SDK can dramatically reduce operational complexity and costs for your organization.
    • The Importance of Identity Documents and the Future of Integrated Travel Systems – Conclusion and Outlook
      June 18, 2025 In this article, we explore how identity verification is evolving to meet the needs of modern travel within the European Union.
    • Connection of Advanced Passenger Information System (API) to Other Systems
      June 11, 2025 In this article, you will learn how the Advanced Passenger Information System (API) interacts with other border control systems to enhance security and efficiency at the EU’s external borders.
    • Why Mobile Apps are the Customer-Friendliest and Most Secure Option
      June 4, 2025 In this article, you will learn how mobile apps are revolutionizing the way Advanced Passenger Information (API) data is collected.
    • What methods are available for Advanced Passenger Information (API)?
      May 28, 2025 In this article, you will learn about the various methods available for collecting Advanced Passenger Information (API) and how these are integrated into the travel experience from the user's perspective.

    Solutions

    • Overview

    About

    • OVD Kinegram
    • References
    summ-it.de/en/

    Products

    • Overview
    • MOBILE SCAN SDK
    • MOBILE CHIP SDK
    • KINEGRAM DIGITAL POLICING
    • Demonstrators

    Use Cases

    • Banking
    • Airlines
    • Hotels
    • Car Rental
    • E-Government
    Kinegram Digital Solutions

    © OVD Kinegram AG

    Imprint | Privacy Policy | Image credits
    Privacy Notice | Terms and Conditions

    made by summ-it

    Link to: Ensuring Chip Authenticity in ID Documents Link to: Ensuring Chip Authenticity in ID Documents Ensuring Chip Authenticity in ID DocumentsEnsuring Chip Authenticity in ID Documents - Kinegram Digital Solutions Link to: Ensuring Data Authenticity in ID Document Chips through Passive Authentication Link to: Ensuring Data Authenticity in ID Document Chips through Passive Authentication Ensuring Data Authenticity in ID Document Chips through Passive Authentication - Kinegram Digital SolutionsEnsuring Data Authenticity in ID Document Chips through Passive Authenticat...
    Scroll to top Scroll to top Scroll to top