Extended Access Control (EAC) is a set of advanced security features for
electronic passports that protects and restricts access to sensitive personal data contained in the
RFID
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electroma ...
chip. In contrast to common personal data (like the bearer's photograph, names, date of birth, etc.) which can be protected by basic mechanisms, more sensitive data (like
fingerprint
A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfa ...
s or
iris images) must be protected further for preventing unauthorized access and skimming. A chip protected by EAC will allow that this sensitive data is read (through an encrypted channel) only by an authorized passport inspection system.
EAC was introduced by
ICAO
The International Civil Aviation Organization (ICAO, ) is a specialized agency of the United Nations that coordinates the principles and techniques of international air navigation, and fosters the planning and development of international ...
as an optional security feature (additional to
Basic Access Control) for restricting access to sensitive
biometric
Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify ...
data in an electronic
MRTD. A general idea is given: the chip must contain chip-individual keys, must have processing capabilities and additional key management will be required. However, ICAO leaves the actual solution open to the implementing States.
There are several different proposed implementations of the mechanism, all of which must retain
backward-compatibility with the
legacy
In law, a legacy is something held and transferred to someone as their inheritance, as by will and testament. Personal effects, family property, marriage property or collective property gained by will of real property.
Legacy or legacies may refer ...
Basic Access Control (BAC), which is mandatory in all
EU countries. The European Commission described that the technology will be used to protect fingerprints in member states' e-passports. The deadline for member states to start issuing fingerprint-enabled e-passports was set to be 28 June 2009. The specification selected for EU e-passports was prepared by the German
Federal Office for Information Security
The Federal Office for Information Security (german: Bundesamt für Sicherheit in der Informationstechnik, abbreviated as BSI) is the German upper-level federal agency in charge of managing computer and communication security for the German go ...
(BSI) in their technical report TR-03110.
[
] Several other countries implement their own EAC.
EAC as defined by the EU
EAC as defined by the
EU has two requirements: chip and terminal authentication.
Chip authentication (for strong session encryption)
The chip authentication specification defines a handheld device (CAP reader) with a smart card slot, a decimal keypad, and a display capable of displaying at least 12 characters. ''
Chip authentication'' (CA) has two functions:
* To authenticate the chip and prove that the chip is genuine. Only a genuine chip can implement communication securely.
* To establish a strongly secured communication channel, using a chip-specific key pair with strong encryption and integrity protection.
Chip authentication has an add-on
Basic Access Control (BAC) with protection against skimming and eavesdropping.
Terminal authentication (access restricted to authorized terminals)
''Terminal authentication'' (TA) is used to determine whether the ''inspection system'' (IS) is allowed to read sensitive data from the e-passport. The mechanism is based on
digital certificates
Digital usually refers to something using discrete digits, often binary digits.
Technology and computing Hardware
*Digital electronics, electronic circuits which operate using digital signals
**Digital camera, which captures and stores digital i ...
which come in the format of ''card verifiable'' certificates.
* Each inspection system is granted a ''
card verifiable certificate'' (CVC) from a ''document verifier'' (DV). The inspection system's certificate is valid only for a short time period, typically between 1 day and 1 month.
* An inspection system may have several CVCs installed at any time, one for each country that allows it to read sensitive data.
* The CVC allows the inspection system to request one or more items of sensitive data, such as data for
iris
Iris most often refers to:
*Iris (anatomy), part of the eye
*Iris (mythology), a Greek goddess
* ''Iris'' (plant), a genus of flowering plants
* Iris (color), an ambiguous color term
Iris or IRIS may also refer to:
Arts and media
Fictional ent ...
or
fingerprint recognition
A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
.
A document verifier certificate is granted from the ''country verification certificate authority'' (CVCA). These certificates can be for domestic or foreign document verifiers. The certificates are typically issued for medium amounts of time, between half a month and 3 months. The CVCA is generated by each country and is typically valid for 6 months to 3 years.
External links
External links
OpenSCDP.org– Open Source EAC-PKI for development and testing
EJBCA.org– Open Source PKI (BAC and EAC)
{{DEFAULTSORT:Extended Access Control
International travel documents
Passports
Biometrics
Data security
Information sensitivity