<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://70.231.62.181/index.php?action=history&amp;feed=atom&amp;title=Extended_Access_Control</id>
	<title>Extended Access Control - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://70.231.62.181/index.php?action=history&amp;feed=atom&amp;title=Extended_Access_Control"/>
	<link rel="alternate" type="text/html" href="http://70.231.62.181/index.php?title=Extended_Access_Control&amp;action=history"/>
	<updated>2026-04-28T12:01:22Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>http://70.231.62.181/index.php?title=Extended_Access_Control&amp;diff=4223108&amp;oldid=prev</id>
		<title>imported&gt;InternetArchiveBot: Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5</title>
		<link rel="alternate" type="text/html" href="http://70.231.62.181/index.php?title=Extended_Access_Control&amp;diff=4223108&amp;oldid=prev"/>
		<updated>2024-03-24T02:31:16Z</updated>

		<summary type="html">&lt;p&gt;Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Extended Access Control&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;EAC&amp;#039;&amp;#039;&amp;#039;) is a set of advanced security features for [[Biometric passport|electronic passports]] that protects and restricts access to sensitive personal data contained in the [[Radio-frequency identification|RFID]] chip. In contrast to common personal data (like the bearer&amp;#039;s photograph, names, date of birth, etc.) which can be protected by basic mechanisms, more sensitive data (like [[fingerprint]]s or [[iris images]]) must be protected further for preventing unauthorized access and skimming. A chip protected by EAC will allow that this sensitive data is read (through an encrypted channel) only by an authorized passport inspection system.&amp;lt;ref&amp;gt;&lt;br /&gt;
{{cite web&lt;br /&gt;
 | title = Security and privacy issues in machine readable travel documents (MRTDs)&lt;br /&gt;
 | url =  http://domino.watson.ibm.com/library/CyberDig.nsf/papers/751B6341BFB9015485256FDB005DB216/$File/RC23575.pdf&lt;br /&gt;
 | work = RC 23575 (W0504-003)&lt;br /&gt;
 |author1=G. S. Kc |author2=P. A. Karger | publisher = IBM&lt;br /&gt;
 | accessdate =  4 Jan 2012&lt;br /&gt;
 | date = 1 April 2005&lt;br /&gt;
 }}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;&lt;br /&gt;
{{cite book&lt;br /&gt;
 | title = Public key infrastructure: 4th European PKI Workshop : theory and practice, EuroPKI 2007&lt;br /&gt;
 |author1=Javier López |author2=Pierangela Samarati |author3=Josep L. Ferrer | publisher = Springer&lt;br /&gt;
 | year = 2007&lt;br /&gt;
 | isbn = 978-3-540-73407-9&lt;br /&gt;
 | page = 41&lt;br /&gt;
 | url = https://books.google.com/books?id=cNanimitjLwC&amp;amp;pg=PA41&lt;br /&gt;
 }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
EAC was introduced by [[International Civil Aviation Organization|ICAO]]&amp;lt;ref&amp;gt;{{cite book&lt;br /&gt;
  | title = ICAO Doc 9303, Machine Readable Travel Documents, Part 1: Machine Readable Passports, Volume 2: Specifications for Electronically Enabled Passports with Biometric Identification Capability&lt;br /&gt;
  | publisher = International Civil Aviation Organization ([[ICAO]])&lt;br /&gt;
  | year = 2006&lt;br /&gt;
  | edition = Sixth&lt;br /&gt;
  | page = 84&lt;br /&gt;
  | section = 5.8 Security for additional biometrics&lt;br /&gt;
  | url = http://www.icao.int/Security/mrtd/Pages/Document9303.aspx&lt;br /&gt;
}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite journal|title=Temporat Secure Digital Identity|journal=EPassport Extended Access Control|volume=White Paper|url=http://www.securitydocumentworld.com/client_files/eac_white_paper_210706.pdf|accessdate=19 June 2013|archive-url=https://web.archive.org/web/20061021005853/http://www.securitydocumentworld.com/client_files/eac_white_paper_210706.pdf|archive-date=21 October 2006|url-status=dead}}&amp;lt;/ref&amp;gt;  as an optional security feature (additional to [[Basic Access Control]]) for restricting access to sensitive [[Biometrics|biometric]] data in an electronic [[Machine-readable passport|MRTD]]. A general idea is given: the chip must contain chip-individual keys, must have processing capabilities and additional key management will be required. However, ICAO leaves the actual solution open to the implementing States.&lt;br /&gt;
&lt;br /&gt;
There are several different proposed implementations of the mechanism, all of which must retain [[Backward compatibility|backward-compatibility]] with the [[Legacy system|legacy]] [[Basic Access Control]] (BAC), which is mandatory in all [[European Union|EU]] countries. The European Commission described that the technology will be used to protect fingerprints in member states&amp;#039; e-passports. The deadline for member states to start issuing fingerprint-enabled e-passports was set to be 28 June 2009. The specification selected for EU e-passports was prepared by the German [[Federal Office for Information Security]] (BSI) in their technical report TR-03110.&amp;lt;ref name=&amp;quot;tr-03110&amp;quot;&amp;gt;&lt;br /&gt;
  {{cite web&lt;br /&gt;
    | website = BSI&lt;br /&gt;
    | title = Advanced Security Mechanisms for Machine Readable Travel Documents – Extended Access Control (EAC)&lt;br /&gt;
    | url=https://www.bsi.bund.de/cae/servlet/contentblob/532066/publicationFile/44792/TR-03110_v202_pdf&lt;br /&gt;
    |format=PDF| accessdate = 2009-11-26 }}&lt;br /&gt;
&amp;lt;/ref&amp;gt; Several other countries implement their own EAC.&lt;br /&gt;
&lt;br /&gt;
==EAC as defined by the EU==&lt;br /&gt;
&lt;br /&gt;
EAC as defined by the [[European Union|EU]] has two requirements: chip and terminal authentication.&amp;lt;ref&amp;gt;{{cite web|first=Dennis |last=Kugler|title=Extended Access Control; Infrastructure and control|date=1 June 2006|volume=|url=http://www.interoptest-berlin.de/pdf/Kuegler_-_Extended_Access_Control.pdf|accessdate=19 June 2013}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Chip authentication (for strong session encryption)===&lt;br /&gt;
&lt;br /&gt;
The chip authentication specification defines a handheld device (CAP reader) with a smart card slot, a decimal keypad, and a display capable of displaying at least 12 characters. &amp;#039;&amp;#039;[[Chip Authentication Program|Chip authentication]]&amp;#039;&amp;#039; (CA) has two functions:&lt;br /&gt;
* To authenticate the chip and prove that the chip is genuine. Only a genuine chip can implement communication securely.&lt;br /&gt;
* To establish a strongly secured communication channel, using a chip-specific key pair with strong encryption and integrity protection.&lt;br /&gt;
Chip authentication has an add-on [[Basic access control|Basic Access Control]] (BAC) with protection against skimming and eavesdropping.&lt;br /&gt;
&lt;br /&gt;
===Terminal authentication (access restricted to authorized terminals)===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Terminal authentication&amp;#039;&amp;#039; (TA) is used to determine whether the &amp;#039;&amp;#039;inspection system&amp;#039;&amp;#039; (IS) is allowed to read sensitive data from the e-passport. The mechanism is based on [[digital certificates]] which come in the format of &amp;#039;&amp;#039;card verifiable&amp;#039;&amp;#039; certificates.&lt;br /&gt;
* Each inspection system is granted a &amp;#039;&amp;#039;[[Card Verifiable Certificate|card verifiable certificate]]&amp;#039;&amp;#039; (CVC) from a &amp;#039;&amp;#039;document verifier&amp;#039;&amp;#039; (DV). The inspection system&amp;#039;s certificate is valid only for a short time period, typically between 1 day and 1 month.&lt;br /&gt;
* An inspection system may have several CVCs installed at any time, one for each country that allows it to read sensitive data.&lt;br /&gt;
* The CVC allows the inspection system to request one or more items of sensitive data, such as data for [[iris recognition|iris]] or [[fingerprint recognition]].&amp;lt;ref name=&amp;quot;eac-protocol&amp;quot;&amp;gt;{{cite web&lt;br /&gt;
    | first = Dennis&lt;br /&gt;
    | last = Kügler&lt;br /&gt;
    | title = Extended Access Control: Infrastructure and Protocol&lt;br /&gt;
    | url = http://parallels.googlecode.com/svn/trunk/msifakis/WIRELESS/Kuegler_-_Extended_Access_Control.pdf&lt;br /&gt;
    | accessdate = 2016-05-03&lt;br /&gt;
    }}{{Dead link|date=August 2019 |bot=InternetArchiveBot |fix-attempted=yes }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A document verifier certificate is granted from the &amp;#039;&amp;#039;country verification certificate authority&amp;#039;&amp;#039; (CVCA). These certificates can be for domestic or foreign document verifiers. The certificates are typically issued for medium amounts of time, between half a month and 3 months. The CVCA is generated by each country and is typically valid for 6 months to 3 years.&amp;lt;ref name=&amp;quot;eac-protocol&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://www.openscdp.org/scripts/icao/eacpki.html OpenSCDP.org] – Open Source EAC-PKI for development and testing&lt;br /&gt;
* [http://www.ejbca.org/ EJBCA.org] – Open Source PKI (BAC and EAC)&lt;br /&gt;
* [https://www.bsi.bund.de/EN/Service-Navi/Publications/TechnicalGuidelines/TR03110/BSITR03110.html EAC specifications from BSI] {{Webarchive|url=https://web.archive.org/web/20211227120500/https://www.bsi.bund.de/EN/Service-Navi/Publications/TechnicalGuidelines/TR03110/BSITR03110.html |date=2021-12-27 }}&lt;br /&gt;
&lt;br /&gt;
{{DEFAULTSORT:Extended Access Control}}&lt;br /&gt;
[[Category:International travel documents]]&lt;br /&gt;
[[Category:Passports]]&lt;br /&gt;
[[Category:Biometrics]]&lt;br /&gt;
[[Category:Data security]]&lt;br /&gt;
[[Category:Information sensitivity]]&lt;/div&gt;</summary>
		<author><name>imported&gt;InternetArchiveBot</name></author>
	</entry>
</feed>