SlideShare a Scribd company logo
RAM Content - Contents in Secure Elements Manjula
Overview 
•Secure Element Types 
•Executable Load Files (Package) 
•Executable Modules (Applets) 
•Application Instances 
•Security Domains 
•Secure Channels 
•SIM-USIM-CSIM-ISIM
Secure Element Types 
•UICC 
•Embedded SE 
•MicroSD
Executable Load Files 
•Executable Load (ELF) File aka Packages 
•ELF contains a one or more Executable Modules. 
•To install an application, we should first put a ELF which contains the Executable Module related to that application to the Secure Element. 
•Actual on-card container of one or more application's executable code (Executable Modules). It may reside in Immutable Persistent Memory or may be created in Mutable Persistent Memory as the resulting image of a Load File Data Block (- from GP 2.2 spec)
Executable Modules 
•Executable Module (EM) aka Applets 
•An Executable Module can be instantiated to one or more application instances. 
•Contains the on-card executable code of a single application present within an Executable Load File (- from GP 2.2 spec)
Application (Instance) 
•Instance of an Executable Module after it has been installed and made selectable (- from GP 2.2 spec) 
•Application Instance is identified by AID. 
–AID (5 to 16 bytes) = RID (5bytes) + PIX (up to 11 bytes) 
–RID : Registered Application Provider 
–PIX : Proprietary Identifier eXtension 
•TAR – Toolkit Application Reference - is used to uniquely identify a second level application (e.g.: Toolkit Application). A second level application may have several TAR values assigned.
Security Domains 
•On-card entity providing support for the control, security, and communication requirements of an off-card entity (e.g. the Card Issuer, an Application Provider or a Controlling Authority) 
•Privileged applications with Security information and key sets.
Security Domains… 
•ISD (Issuer Security Domain) or Card Manager 
–The primary on-card entity providing support for the control, security, and communication requirements of the card administrator (typically the Card Issuer) 
•SSD (Supplementary Security Domain) 
–A Security Domain other than the Issuer Security Domain 
•CASD (Controlling Authority Security Domain) 
– a special type of Supplementary Security Domain. A Controlling Authority may exist whose role is to enforce the security policy on all application code loaded to the card. If so, the Controlling Authority also uses this type of Security Domain as its on-card representative. There may be more than one such Security Domain.
Secure Channels 
•A communication mechanism between an off- card entity and a card that provides a level of assurance, to one or both entities. 
•Secure Channel Protocol 
– A secure communication protocol and set of security services 
•E.g.: SCP 02, SCP 80,… 
•Secure Channel Session 
–A session, during an Application Session, starting with the Secure Channel initiation and ending with a Secure Channel termination or termination of either the Application Session or Card Session
Delegated Management 
•Pre-authorized Card Content changes performed by an approved Application Provider 
•Token 
–A cryptographic value provided by a Card Issuer as proof that a Delegated Management operation has been authorized
SIM, USIM, ISIM, CSIM 
•These are network Authentication Applications resides in UICC. 
•Can have one or more applications in a UICC. 
•SIM – for GSM networks 
•USIM – for UMTS networks 
•CSIM – for CDMA network authentication 
•ISIM – for accessing IP Multimedia Subsystem networks
R-UIM 
•Removable user identity card 
•Contains SIM, USIM, CSIM applications 
•So can use in GSM or UMTS or CDMA handsets
References 
•Global Platform Specification

More Related Content

PDF
Secure Elements in Web Applications
PPTX
Secure Element Solutions
PPTX
What UICC Means for NFC & Security
PPTX
Two factor authentication 2018
PPTX
Two Factor Authentication
PPTX
OmniSource_ppt_2011_7-2 (2)(1)
PPTX
Mobile Security for the Enterprise
PDF
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
Secure Elements in Web Applications
Secure Element Solutions
What UICC Means for NFC & Security
Two factor authentication 2018
Two Factor Authentication
OmniSource_ppt_2011_7-2 (2)(1)
Mobile Security for the Enterprise
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel

What's hot (20)

PPTX
Two Factor Authentication: Easy Setup, Major Impact
PDF
CNIT 128 7: Mobile Device Management
PPTX
Multifactor Authentication
PDF
CyberArk Cleveland Defend Multi-Factor
PPTX
Logincat MFA and SSO
PPTX
Intro to Smart Cards & Multi-Factor Authentication
PPTX
Seminar-Two Factor Authentication
PPTX
Hardware Authentication
PPTX
Security on android
PDF
CNIT 128: 9: Mobile payments
PPS
Research Paper
PDF
SolusDeck
PPTX
Two factor authentication presentation mcit
PDF
How Intel Security Ensures Identity Protection - Infographic
PPTX
TS31103 ISIM introduction
PDF
Strong Authentication and US Federal Digital Services
PPTX
End point control
PDF
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
PDF
Introduction to Solus
PDF
Combat the Latest Two-Factor Authentication Evasion Techniques
Two Factor Authentication: Easy Setup, Major Impact
CNIT 128 7: Mobile Device Management
Multifactor Authentication
CyberArk Cleveland Defend Multi-Factor
Logincat MFA and SSO
Intro to Smart Cards & Multi-Factor Authentication
Seminar-Two Factor Authentication
Hardware Authentication
Security on android
CNIT 128: 9: Mobile payments
Research Paper
SolusDeck
Two factor authentication presentation mcit
How Intel Security Ensures Identity Protection - Infographic
TS31103 ISIM introduction
Strong Authentication and US Federal Digital Services
End point control
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
Introduction to Solus
Combat the Latest Two-Factor Authentication Evasion Techniques
Ad

Viewers also liked (20)

PDF
Android HCE: An intro into the world of NFC
PPT
DC4420 2014 - NFC - The Non-Radio Bits
PDF
Entrellat 11
PPT
3a Oracle Day Sigorta
PPT
Insider trading_in_turkey
PDF
The Influence of Ethnic Identity on Consumer Behaviour
PPTX
SMiB09 Peter Crosby
PPT
Reunió De Pares
PDF
Caching your rails application
PPT
TRATADO DE GINEBRA
PPT
Excel2007 Power Point Slides
PPTX
Case study twitter
PDF
FCEVs and H2 in California
PDF
Week10
PDF
myStratex Strategy Board Game
PPT
Seoheaven
PPTX
Hands-on User Experience
PPTX
Shelley's Personal Brand Plan
PPTX
PreparacióN De Unas Vacaciones
Android HCE: An intro into the world of NFC
DC4420 2014 - NFC - The Non-Radio Bits
Entrellat 11
3a Oracle Day Sigorta
Insider trading_in_turkey
The Influence of Ethnic Identity on Consumer Behaviour
SMiB09 Peter Crosby
Reunió De Pares
Caching your rails application
TRATADO DE GINEBRA
Excel2007 Power Point Slides
Case study twitter
FCEVs and H2 in California
Week10
myStratex Strategy Board Game
Seoheaven
Hands-on User Experience
Shelley's Personal Brand Plan
PreparacióN De Unas Vacaciones
Ad

Similar to Secure element content (20)

PPTX
EOC MODULE 3 IP security - SR.pptx engineering college
PPTX
Safe and secure autonomous systems
PDF
Securing the Internet of Things - Hank Chavers
PPT
Trusted computing introduction and technical overview
PDF
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
PDF
Sfa community of practice a natural way of building
PDF
Embedded System Security: Learning from Banking and Payment Industry
PPTX
501 ch 5 securing hosts and data
DOCX
[removed]Cryptography and Network Security Principles a.docx
PDF
Understanding Telecom SIM and USIM/ISIM for LTE
PPT
SCOSTA (Smart Card Operating System for Transport Applications)
PPT
IS Unit-4 .ppt
PDF
Multilayer security mechanism in computer networks (2)
PDF
Secure sigfox ready devices recommendation guide
PDF
Application layer security protocol
PPTX
Smart id's
PDF
Multilayer security mechanism in computer networks
PDF
11.multilayer security mechanism in computer networks
PDF
Reference Architecture for Electric Energy OT.pdf
EOC MODULE 3 IP security - SR.pptx engineering college
Safe and secure autonomous systems
Securing the Internet of Things - Hank Chavers
Trusted computing introduction and technical overview
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)
Sfa community of practice a natural way of building
Embedded System Security: Learning from Banking and Payment Industry
501 ch 5 securing hosts and data
[removed]Cryptography and Network Security Principles a.docx
Understanding Telecom SIM and USIM/ISIM for LTE
SCOSTA (Smart Card Operating System for Transport Applications)
IS Unit-4 .ppt
Multilayer security mechanism in computer networks (2)
Secure sigfox ready devices recommendation guide
Application layer security protocol
Smart id's
Multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
Reference Architecture for Electric Energy OT.pdf

Recently uploaded (20)

PPTX
Indian Medical Device Rules or Institute of Management Development and Research.
PPTX
BL 2 - Courts and Alternative Dispute Resolution.pptx
PDF
OBLICON (Civil Law of the Philippines) Obligations and Contracts
PPTX
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
PDF
Insolvency and Bankruptcy Amendment Bill 2025
PPTX
BL - Chapter 1 - Law and Legal Reasoning
PPTX
Classifying Different Branches of Law.pptx
PDF
Companies Act (1).pdf in details anlysis
PPTX
Court PROCESS Notes_Law Clinic Notes.pptx
PDF
AHRP LB - OJK’s New Rules Updating Electronic Shareholders Meetings Introduci...
PDF
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
PPTX
Evolution of First Amendment Jurisprudence.pptx
PDF
Analysis Childrens act Kenya for the year 2022
PDF
NRL_Legal Regulation of Forests and Wildlife.pdf
PPTX
PPT in Consti 2 Report (Week1).pptx under the contituiton
PDF
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
PPTX
Basic key concepts of law by Shivam Dhawal
PPTX
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
PDF
Palghar-286Nilemore-VoterList-Aug25-1.pdf
Indian Medical Device Rules or Institute of Management Development and Research.
BL 2 - Courts and Alternative Dispute Resolution.pptx
OBLICON (Civil Law of the Philippines) Obligations and Contracts
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
Insolvency and Bankruptcy Amendment Bill 2025
BL - Chapter 1 - Law and Legal Reasoning
Classifying Different Branches of Law.pptx
Companies Act (1).pdf in details anlysis
Court PROCESS Notes_Law Clinic Notes.pptx
AHRP LB - OJK’s New Rules Updating Electronic Shareholders Meetings Introduci...
Palghar-SGupta-ScreesnShots-12Aug25.pdf The image of the voter list with phot...
Evolution of First Amendment Jurisprudence.pptx
Analysis Childrens act Kenya for the year 2022
NRL_Legal Regulation of Forests and Wildlife.pdf
PPT in Consti 2 Report (Week1).pptx under the contituiton
250811-FINAL-Bihar_Voter_Deletion_Analysis_Presentation.pdf
Basic key concepts of law by Shivam Dhawal
R.A. NO. 76 10 OR THE CHILD ABUSE LAW.pptx
Palghar-286Nilemore-VoterList-Aug25-1.pdf

Secure element content

  • 1. RAM Content - Contents in Secure Elements Manjula
  • 2. Overview •Secure Element Types •Executable Load Files (Package) •Executable Modules (Applets) •Application Instances •Security Domains •Secure Channels •SIM-USIM-CSIM-ISIM
  • 3. Secure Element Types •UICC •Embedded SE •MicroSD
  • 4. Executable Load Files •Executable Load (ELF) File aka Packages •ELF contains a one or more Executable Modules. •To install an application, we should first put a ELF which contains the Executable Module related to that application to the Secure Element. •Actual on-card container of one or more application's executable code (Executable Modules). It may reside in Immutable Persistent Memory or may be created in Mutable Persistent Memory as the resulting image of a Load File Data Block (- from GP 2.2 spec)
  • 5. Executable Modules •Executable Module (EM) aka Applets •An Executable Module can be instantiated to one or more application instances. •Contains the on-card executable code of a single application present within an Executable Load File (- from GP 2.2 spec)
  • 6. Application (Instance) •Instance of an Executable Module after it has been installed and made selectable (- from GP 2.2 spec) •Application Instance is identified by AID. –AID (5 to 16 bytes) = RID (5bytes) + PIX (up to 11 bytes) –RID : Registered Application Provider –PIX : Proprietary Identifier eXtension •TAR – Toolkit Application Reference - is used to uniquely identify a second level application (e.g.: Toolkit Application). A second level application may have several TAR values assigned.
  • 7. Security Domains •On-card entity providing support for the control, security, and communication requirements of an off-card entity (e.g. the Card Issuer, an Application Provider or a Controlling Authority) •Privileged applications with Security information and key sets.
  • 8. Security Domains… •ISD (Issuer Security Domain) or Card Manager –The primary on-card entity providing support for the control, security, and communication requirements of the card administrator (typically the Card Issuer) •SSD (Supplementary Security Domain) –A Security Domain other than the Issuer Security Domain •CASD (Controlling Authority Security Domain) – a special type of Supplementary Security Domain. A Controlling Authority may exist whose role is to enforce the security policy on all application code loaded to the card. If so, the Controlling Authority also uses this type of Security Domain as its on-card representative. There may be more than one such Security Domain.
  • 9. Secure Channels •A communication mechanism between an off- card entity and a card that provides a level of assurance, to one or both entities. •Secure Channel Protocol – A secure communication protocol and set of security services •E.g.: SCP 02, SCP 80,… •Secure Channel Session –A session, during an Application Session, starting with the Secure Channel initiation and ending with a Secure Channel termination or termination of either the Application Session or Card Session
  • 10. Delegated Management •Pre-authorized Card Content changes performed by an approved Application Provider •Token –A cryptographic value provided by a Card Issuer as proof that a Delegated Management operation has been authorized
  • 11. SIM, USIM, ISIM, CSIM •These are network Authentication Applications resides in UICC. •Can have one or more applications in a UICC. •SIM – for GSM networks •USIM – for UMTS networks •CSIM – for CDMA network authentication •ISIM – for accessing IP Multimedia Subsystem networks
  • 12. R-UIM •Removable user identity card •Contains SIM, USIM, CSIM applications •So can use in GSM or UMTS or CDMA handsets