• Solutions
    • Rapid and Comprehensive All-In-One Scanning Solution
    • Identity Document Verification for Onboarding
    • Identity Establishment for Police Forces
  • Products
    • MOBILE SCAN SDK
      • MRZ Scanner & Parser
      • Readme iOS
      • Readme Android
    • MOBILE CHIP SDK
      • eMRTD Connector
        • eMRTD Connector Demo
        • Readme iOS
        • Readme Android
      • DocVal Server
        • Supported Countries and Organizations
        • Installation Guide
        • Technical Guide
        • WebSocket API
        • REST API
        • Example eMRTD Result
    • KINEGRAM DIGITAL POLICING
      • MOBILE SCAN SDK
      • CHIP VERIFY
      • DOC LIBRARY
    • TRY IT YOURSELF
      • Demonstrators on Identity Verification
  • Use Cases
    • Banking
    • Airlines
    • Hotels
    • Car Rental
    • E-Government
  • About
    • OVD Kinegram
    • Events
    • References
  • Resources
    • Demonstrators
    • Knowledge Base
      • Evaluate our Solution
      • Why Our Solution is Secure
    • Success Story
    • White Paper
  • Contact
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Accessing Data from the Chip on ID Documents

Technical Aspects and Protocols

Modern ID documents, such as electronic passports (ePassports) and national ID cards, incorporate embedded microchips that store biometric and biographic data securely. These chips facilitate machine-readable travel documents under standards set by the International Civil Aviation Organization (ICAO). Accessing data stored on these chips involves several key components and protocols, each crucial for ensuring data integrity and security.

This article will delve into the details of the Document Security Object (SOD), the various Data Groups (DG1-DG20), the Attributes of the chip (ATR), the Card Access File, and the Common Object Model (COM).

Document Security Object (SOD)

The SOD* is a fundamental security feature in ID document chips. It contains the digital signature of all the data stored on the chip, ensuring the integrity and authenticity of the data. The digital signature is typically generated using a certificate issued by a trusted certificate authority (CA). This certificate, along with the hash values of the data groups, are stored within the SOD. When data is accessed from the chip, the SOD allows the validating system to confirm that the data has not been altered since the document was issued.

Kinegram Digital Solutions

Data Groups (DG)

The information on an ID document chip is organized into specific Data Groups (DGs). Here are the key data groups and their contents:

DG1 – Machine Readable Zone (MRZ) Information

This contains the data printed in the MRZ of the travel document, such as the document holder’s name, document number, nationality, and date of birth. This information is critical for initial verification and is used to login to the chip.

DG2 – Biometric Information

Typically holds the facial image of the document holder, used for biometric checks at border controls.

DG3 (optional) – Fingerprints

This group is used to store the fingerprint images of the document holder, usually required by countries implementing higher security measures. To be able to read the contents of this DG, special certificates are required.

DG4 (optional) – Iris Data

DG4 stores iris scan information, which some countries use for advanced biometric verification. To access the contents of this DG, special certificates are required.

DG5 (optional) – Displayed Portrait

Contains one or more portrait of the document holder used for visual inspection, which can differ from the biometrically captured image in DG2.

DG6 (optional) – Specific national applications

This group is reserved for future use or for specific national applications. It is not universally defined and vary by the issuing country.

DG7 (optional) – Signature or Usual Mark

Image of the Signature or Usual Mark

DG8 to DG10 (optional)

These groups are reserved for future use or for specific national applications. They are not universally defined and vary by the issuing country.

DG11 (optional) – Personal Data Additional Details

Stores additional personal details like the document holder’s profession, titles, or proof marks.

DG12 (optional) – Additional Document Details

Contains information about the issuing authority or other administrative entries related to the document issuance.

DG13 (optional) – Optional Details

Used for optional or additional data not covered by other groups, again varying by country.

DG14 (optional) – Cryptographic Info

Holds public key information and security objects, enhancing the security of the communication between the chip and the reader.

DG15 (optional) – Active Authentication Public Key

Contains the public key used for Active Authentication, designed to prove the authenticity of the chip and combat forgery.

Each DG is protected and can only be accessed once proper authentication mechanisms, like Basic Access Control (BAC) or Password Authenticated Connection Establishment (PACE), are successfully executed.

Accessing Data from the Chip on ID Documents - Kinegram Digital Solutions

Answer To Reset (ATR)

The Answer To Reset (ATR) or ATR/Info is a standard response from a smart card microprocessor (including the chips in ID documents) upon connection with a reader. It provides essential information about the card, including supported protocols and operational parameters necessary for the communication setup. The ATR helps in establishing the physical and logical parameters to be used in subsequent communications.

Kinegram Digital Solutions

Card Access File (CAF)

The Card Access File (CAF) is crucial for defining the security conditions under which the chip’s data can be accessed. It specifies the protocols supported by the chip (e.g., T=1, T=CL), the type of secure messaging supported, and the access rules for each data group. This file is pivotal in setting up the security architecture for data access and ensuring compliance with international standards for protected data transmission.

Kinegram Digital Solutions

Common Object Model (COM)

The Common Object Model (COM) contains metadata about the logical data structure on the chip. Typically, it includes a directory of the data groups available on the chip and their respective identifiers. The COM plays an essential role in guiding the reading devices on how to parse and interact with the data correctly and efficiently. This directory facilitates quick access to specific data groups by providing direct pointers to their locations on the chip.

Kinegram Digital Solutions

Accessing Data From the Chip on ID Documents – Conclusion

The protocols and structures described above outline a robust framework for securely accessing and processing the sensitive data stored on ID document chips. These mechanisms ensure that the data can only be accessed by authorized entities and protect against unauthorized data tampering and interception. As security threats evolve, these systems must be continually updated and tested to safeguard personal information against emerging vulnerabilities.

* Source: https://www.icao.int/publications/Documents/9303_p10_cons_en.pdf

Learn more on Accessing Data From the Chip on ID Documents

    First Name *

    Last Name *

    Company *

    Position

    E-Mail *

    Phone *

    Message *

    *

    I agree that my data from the contact form will be collected to answer my request and for marketing and sales purposes. You can find more information in our privacy policy.

    Contact

    White Paper

    Download White Paper "Secure and Efficient Onboarding of new Customers for Better Business Results" Download White Paper Secure and Efficient Onboarding of new Customers for Better Business Results

    Success Story

    Download Success Story "Enhancing Identity Verification and Customer Onboarding" Success Story Enhancing Identity Verification and Customer Onboarding

    RSS Knowledge Base

    • The Importance of Identity Documents and the Future of Integrated Travel Systems
      May 14, 2024 In this series of articles, you will learn how travel across Europe relies on identity document verification even in a “borderless” Schengen Area, why current systems are facing growing challenges, and how emerging digital travel technologies like the Advanced Passenger Information (API) system are reshaping the future of mobility.
    • Chip-Based Biometrics
      April 9, 2025 This article highlights the importance of chip-based eMRTDs (electronic Machine-Readable Travel Documents) in combating identity theft and deepfakes.
    • Passport-Based Multi-Factor Authentication
      March 26, 2025 In this article, you will learn more about the role of passport-based multi-factor authentication (MFA) in enhancing digital security for high-value transactions.
    • How our Identity Document Verification Solution Integrates Into Onboarding and KYC Processes
      February 26, 2025 In this article, you will learn more on how our Identity Document Verification Solution integrates into onboarding and KYC processes
    • Reduce Fraud with Advanced ID Verification and Electronic Passports
      February 12, 2025 In this article, we explore the escalating challenge of identity fraud in the digital era and how advanced ID verification methods can help businesses stay secure.
    • Essential Strategies for Effective Identity Proofing and Client Onboarding
      January 29, 2025 This article outlines essential strategies for mastering KYC verification and client onboarding processes, emphasizing the importance of security, automation, and regulatory compliance.
    • Future Trends in KYC and Identity Proofing
      January 22, 2025 In this article, you will learn more about the future trends shaping KYC and identity proofing, driven by technological advancements, and evolving regulatory requirements.
    • How does the MOBILE CHIP SDK support identity proofing and KYC Processes?
      January 15, 2025 This article explains how the MOBILE CHIP SDK supports identity proofing and KYC processes by offering real-time, secure verification of electronic identity documents via NFC technology.
    • Customer Onboarding Strategies
      January 8, 2025 In this article, you will learn more about customer onboarding strategies with a focus on streamlining the process, integrating KYC verification, and leveraging digital tools.
    • Best Practices for Effective Identity Proofing
      December 18, 2024 This article discusses best practices for effective identity proofing, focusing on ensuring data accuracy, implementing secure verification processes, and adopting self-service KYC solutions.

    Solutions

    • Solutions

    About

    • OVD Kinegram
    • References
    summ-it.de

    Products

    • Overview
    • MOBILE SCAN SDK
    • MOBILE CHIP SDK
    • KINEGRAM DIGITAL POLICING
    • Demonstrators

    Use Cases

    • Banking
    • Airlines
    • Hotels
    • Car Rental
    • E-Government
    Kinegram Digital Solutions

    © OVD Kinegram AG

    Imprint | Privacy Policy | Image credits
    Privacy Notice | Terms and Conditions

    made by summ-it

    Link to: Ensuring Chip Authenticity in ID Documents Link to: Ensuring Chip Authenticity in ID Documents Ensuring Chip Authenticity in ID DocumentsEnsuring Chip Authenticity in ID Documents - Kinegram Digital Solutions Link to: Ensuring Data Authenticity in ID Document Chips through Passive Authentication Link to: Ensuring Data Authenticity in ID Document Chips through Passive Authentication Ensuring Data Authenticity in ID Document Chips through Passive Authentication - Kinegram Digital SolutionsEnsuring Data Authenticity in ID Document Chips through Passive Authenticat...
    Scroll to top Scroll to top Scroll to top