Secure Element (SE)
A tamper-resistant hardware component (embedded chip, SIM, or microSD) that securely stores payment credentials and cryptographic keys. Used by Apple Pay and some Android payment implementations for enhanced security.
What Is a Secure Element?
A Secure Element (SE) is a tamper-resistant hardware component designed to securely store sensitive data such as payment credentials, cryptographic keys, and digital identities within an NFC-enabled device. The SE provides a physically isolated execution environment where security-critical operations occur independently of the device's main operating system, protecting against software attacks and physical tampering.
Types of Secure Elements
Three primary form factors exist for secure elements in NFC devices:
| Type | Location | Control | Example |
|---|---|---|---|
| Embedded SE (eSE) | Soldered to device motherboard | Device manufacturer | Apple iPhone SE |
| UICC-based SE | SIM card | Mobile carrier | SIM-based payments |
| microSD SE | Removable microSD slot | Card provider | Legacy Android devices |
Apple's approach uses an embedded SE directly controlled by Apple, enabling tight integration between hardware and software for Apple Pay. This architectural decision gives Apple full control over the provisioning pipeline and security policies, independent of mobile carriers.
How the Secure Element Works in Payments
During a contactless payment transaction, the payment flow involves direct communication between the POS terminal and the secure element:
- The NFC controller detects the terminal's RF field and enters card emulation mode.
- The NFC controllerNFC controllerDedicated IC managing NFC protocol stack in readers/smartphonesView full → routes incoming APDU commands directly to the SE, bypassing the main processor entirely.
- The SE selects the appropriate payment applet based on the AID (Application Identifier).
- The SE generates a transaction-specific cryptogram using stored keys and returns the response.
- The NFC controller transmits the response back to the terminal.
Because the main processor never touches the payment credentials, malware on the device cannot intercept or duplicate the card data. This is the fundamental security advantage over HCE software-based approaches.
Security Properties
Secure elements are certified to Common Criteria EAL 5+ or higher, meaning they have been rigorously tested against physical attacks including:
- Side-channel attacks (power analysis, electromagnetic emanation)
- Fault injection (voltage glitching, laser probing)
- Physical probing (circuit layer removal and microprobing)
- Software attacks (buffer overflows, applet isolation failures)
The SE runs its own operating system (typically JavaCard or MULTOS) with strict memory isolation between applets. Each payment network's credentials are stored in separate security domains, preventing one applet from accessing another's data.
GlobalPlatform Standard
Secure element management follows the GlobalPlatform specification, which defines how applets are loaded, installed, and managed remotely via Trusted Service Managers (TSMs). The TSM acts as an intermediary between the card issuer and the SE, enabling over-the-air provisioning of payment credentials without physical card distribution.
SE vs TEE vs HCE
For applications requiring the highest security assurance, the secure element remains the gold standard. The Trusted Execution Environment (TEE) offers a middle ground with hardware-backed key storage but less physical tamper resistance. HCE provides the most accessible development model but relies on tokenization and network connectivity to compensate for the lack of dedicated hardware security. Choosing the right approach depends on the application's threat model and deployment requirements.
Related Terms
Related Guides
Câu Hỏi Thường Gặp
The NFC glossary is a comprehensive reference of technical terms, acronyms, and concepts used in Near Field Communication technology. It is designed for developers, product managers, and engineers who work with NFC and need clear definitions of terms like NDEF, APDU, anti-collision, and ISO 14443.
Each glossary term is cross-referenced with related NFC chips, standards, and other terms. For example, the term 'AES-128' links to chips that support AES encryption (NTAG 424 DNA, DESFire EV2/EV3), and the term 'ISO 14443' links to all chips compliant with that standard.
Yes. NFCFYI provides glossary definitions in 15 languages including English, Korean, Japanese, Chinese, Spanish, Portuguese, Hindi, Arabic, French, Russian, German, Turkish, Vietnamese, Indonesian, and Thai. Use the language selector in the header to switch languages.