SlideShare a Scribd company logo
Secure Element
The component in a mobile phone providing the security and
confidentiality required to support various business models (m-gov, mpayment, m-commerce, m-security, etc.) in this environment, is referred
to as a Secure Element (SE).
The Secure Element is isolated in
the phone’s operating system and
hardware and can only be
accessed by authorized programs.
Another layer of security is
provided by requiring you to enter
a PIN before accessing the Secure
Element
to
transmit
your
m-credentials during transactions.
Motivation for Secure Elements
Necessary for several Applications:
- Payment
- Ticketing
- Government
- Secure Authentication
- ….
Because it is considered:
- Trusted
- Secure
Current Secure Element Implementations
– Embedded in Mobile Phone
– SIM Based
– Removeable Secure Element (SD Card)
Architecture
HTTPS
SMS (encrypted)
Secure Element Protocols
- NFC
- HTTP
- SMS
- Bluetooth
Security Algorithms
- Public Key Infrastructure
- RSA
- Elliptic Curve Cryptography
- Encrypted SMS
- Encrypted Instant Messaging
- HTTPS (SSL)
Our Solution
Secure Element in:
1) Phone ‘s memory with a specialized
App for
iOS, Android, BlackBerry, Windows
Phone
2) SIM card as JavaCard, SIM Application
Toolkit Applet for all mobile phones.
3) External, removeable, SD card with a
specialized App for
Android, BlackBerry, Windows Phone.
Transactions over
- NFC
- SMS (encrypted),
- HTTP, HTTPS
Secure Element in the SIM
- JavaCard (SIM Application Toolkit ) applet in the SIM
- User Interface as:
- SIM Toolkit Menu
or
- Smart Card Web Server (SCWS)
- Transaction based upon
- Encrypted SMS (ETSI 03.48)
- BIP (HTTP)
Secure Element in Phone’s Memory/SD
- App installed in the phone
(android, iOS, BlackBerry, Windows Phone, etc)

- User Interface in the App
- Transaction (based upon the phone’s features) via:
- Encrypted SMS
- HTTPS
- NFC
http://www.cryptware.com

More Related Content

PPTX
Mobile Computing Architecture
PPTX
Install Redis on Oracle Linux
PPT
Android vs Others Operating System
PDF
RIL and Android Telephony
PPTX
Android ppt
PDF
Routing in Mobile Ad hoc Networks
KEY
Android Development: The Basics
PPTX
Wireless lan security
Mobile Computing Architecture
Install Redis on Oracle Linux
Android vs Others Operating System
RIL and Android Telephony
Android ppt
Routing in Mobile Ad hoc Networks
Android Development: The Basics
Wireless lan security

What's hot (20)

PPTX
AAA Implementation
PDF
Telco Cloud - 02. Introduction to NFV - Network Function Virtualization
PPT
Android Security
PPTX
My presentation on Android in my college
PPT
Android Architecture
PPTX
Mobile application development ppt
PDF
Android tutorial ppt
PDF
Network Access Control (NAC)
PDF
Ccna cheat sheet
PDF
What is a Trusted Service Manager?
PPTX
Handover in Mobile Computing
PPTX
HSRP ccna
PPTX
Understanding android security model
PPT
CORDLESS SYSTEMS
PDF
Mobile Application Security
PPTX
Versions of Android OS
PPTX
Android Operating System
PPTX
Packet sniffing
PPTX
Wireless Attacks
AAA Implementation
Telco Cloud - 02. Introduction to NFV - Network Function Virtualization
Android Security
My presentation on Android in my college
Android Architecture
Mobile application development ppt
Android tutorial ppt
Network Access Control (NAC)
Ccna cheat sheet
What is a Trusted Service Manager?
Handover in Mobile Computing
HSRP ccna
Understanding android security model
CORDLESS SYSTEMS
Mobile Application Security
Versions of Android OS
Android Operating System
Packet sniffing
Wireless Attacks
Ad

Viewers also liked (10)

PPTX
What UICC Means for NFC & Security
PDF
Eric java card-basics-140314
PPT
FIPS 201 / PIV
PPT
Technical Overview of Java Card
PPTX
IoT Security: Cases and Methods [CON5446]
PDF
Secure Elements in Web Applications
PDF
IoT summit - Building flexible & secure IoT solutions
PPTX
Javacard
PPT
NFC Basic Concepts
PPT
Mobile Payment fraud & risk assessment
What UICC Means for NFC & Security
Eric java card-basics-140314
FIPS 201 / PIV
Technical Overview of Java Card
IoT Security: Cases and Methods [CON5446]
Secure Elements in Web Applications
IoT summit - Building flexible & secure IoT solutions
Javacard
NFC Basic Concepts
Mobile Payment fraud & risk assessment
Ad

Similar to Secure Element Solutions (8)

PDF
Droidcon2013 key2 share_dmitrienko_fraunhofer
PPTX
Smart Card and Strong Cryptography for instant security
PPTX
Secure mobile payment
PDF
Security issues in_mobile_payment
PPTX
Mobile Forensics
PDF
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
PPTX
811719104102_Tamilmannavan S.pptx
PDF
A Secure Protocol For End To End Security To SMS Banking
Droidcon2013 key2 share_dmitrienko_fraunhofer
Smart Card and Strong Cryptography for instant security
Secure mobile payment
Security issues in_mobile_payment
Mobile Forensics
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
811719104102_Tamilmannavan S.pptx
A Secure Protocol For End To End Security To SMS Banking

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PPTX
A Presentation on Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
cuic standard and advanced reporting.pdf
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
A Presentation on Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
gpt5_lecture_notes_comprehensive_20250812015547.pdf
20250228 LYD VKU AI Blended-Learning.pptx
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology

Secure Element Solutions

  • 1. Secure Element The component in a mobile phone providing the security and confidentiality required to support various business models (m-gov, mpayment, m-commerce, m-security, etc.) in this environment, is referred to as a Secure Element (SE). The Secure Element is isolated in the phone’s operating system and hardware and can only be accessed by authorized programs. Another layer of security is provided by requiring you to enter a PIN before accessing the Secure Element to transmit your m-credentials during transactions.
  • 2. Motivation for Secure Elements Necessary for several Applications: - Payment - Ticketing - Government - Secure Authentication - …. Because it is considered: - Trusted - Secure
  • 3. Current Secure Element Implementations – Embedded in Mobile Phone – SIM Based – Removeable Secure Element (SD Card)
  • 5. Secure Element Protocols - NFC - HTTP - SMS - Bluetooth
  • 6. Security Algorithms - Public Key Infrastructure - RSA - Elliptic Curve Cryptography - Encrypted SMS - Encrypted Instant Messaging - HTTPS (SSL)
  • 7. Our Solution Secure Element in: 1) Phone ‘s memory with a specialized App for iOS, Android, BlackBerry, Windows Phone 2) SIM card as JavaCard, SIM Application Toolkit Applet for all mobile phones. 3) External, removeable, SD card with a specialized App for Android, BlackBerry, Windows Phone. Transactions over - NFC - SMS (encrypted), - HTTP, HTTPS
  • 8. Secure Element in the SIM - JavaCard (SIM Application Toolkit ) applet in the SIM - User Interface as: - SIM Toolkit Menu or - Smart Card Web Server (SCWS) - Transaction based upon - Encrypted SMS (ETSI 03.48) - BIP (HTTP)
  • 9. Secure Element in Phone’s Memory/SD - App installed in the phone (android, iOS, BlackBerry, Windows Phone, etc) - User Interface in the App - Transaction (based upon the phone’s features) via: - Encrypted SMS - HTTPS - NFC