Secure elements — from SIM to IoT identity chip.
Tamper-resistant silicon has moved from early SIM-card form factors into NFC payment elements, embedded secure elements (eSE), TPMs, eSIM / eUICC, and finally purpose-built IoT trust chips — each step pushed by a new use case and a new threat model.
GSM SIM standardised (ETSI GSM 11.11)
The mobile-subscriber identity module is the original mass-deployed secure element. Three decades of SIM iteration begin.
Java Card secure-element platform
Multi-application secure elements with the JCVM firewall become possible — same chip, isolated applets.
TCPA / TPM 1.0 specifications
Trusted Computing Platform Alliance publishes the TPM 1.0 spec. Discrete TPM chips begin shipping on enterprise PCs.
Common Criteria EAL5+ chip platforms
Smart-card silicon attains CC EAL5+ certification at the chip-platform level — the de facto baseline for high-assurance SEs.
NFC payments + embedded SE (eSE)
Google Wallet and Apple Pay drive embedded SE adoption in handsets. The eSE becomes a distinct chip from the SIM.
TPM 2.0 specifications
Library-based redesign with algorithm agility, hierarchical key storage, and platform authorisation. fTPM / dTPM coexist.
GSMA eUICC consumer specification
GSMA SGP.22 (consumer eSIM) standardised. The SIM moves from removable card to embedded provisionable element.
M2M eSIM (GSMA SGP.02 → SGP.32)
Eventually GSMA SGP.32 modernises M2M eSIM provisioning for IoT use cases. The eUICC becomes a general-purpose telecom SE.
TPM 2.0 + Microsoft Pluton platform announcements
Embedded security processors begin to ship inside CPUs. The boundary between SE and CPU softens.
IoT-grade secure elements at scale
Purpose-built secure elements for connected devices: I²C / SPI interface, low power, attestation primitives, signed-firmware verification. The IoT SE category matures.
Multi-applet SEs across form factors
A single CC EAL5+ secure element carries FIDO2 + PIV + OpenPGP + NDEF in card form, embedded MFF2 form, USB form, or nano-card form — AID-selectable.
SE-anchored identity in every connected product
Authenticators, automotive identity, eMRTD chips, and IoT devices share one architectural pattern: tamper-resistant key custody in a secure element, attestation verified by a tenant-scoped service.
Continue exploring.
Building against this evolution?
If your roadmap touches any of these milestones, our engineering team can map the standards posture to a deployable architecture.