Ambimat GroupAmbimatAmbiSecureeSIM InitiativeEngineering BlogAhmedabad · India · Est. 1981
Standards evolution

Secure elements — from SIM to IoT identity chip.

Tamper-resistant silicon has moved from early SIM-card form factors into NFC payment elements, embedded secure elements (eSE), TPMs, eSIM / eUICC, and finally purpose-built IoT trust chips — each step pushed by a new use case and a new threat model.

1991

GSM SIM standardised (ETSI GSM 11.11)

The mobile-subscriber identity module is the original mass-deployed secure element. Three decades of SIM iteration begin.

GSM SIM
1998

Java Card secure-element platform

Multi-application secure elements with the JCVM firewall become possible — same chip, isolated applets.

JavaCard
1999

TCPA / TPM 1.0 specifications

Trusted Computing Platform Alliance publishes the TPM 1.0 spec. Discrete TPM chips begin shipping on enterprise PCs.

TPM 1.0
2003

Common Criteria EAL5+ chip platforms

Smart-card silicon attains CC EAL5+ certification at the chip-platform level — the de facto baseline for high-assurance SEs.

CC EAL5+
2011

NFC payments + embedded SE (eSE)

Google Wallet and Apple Pay drive embedded SE adoption in handsets. The eSE becomes a distinct chip from the SIM.

eSE
2012

TPM 2.0 specifications

Library-based redesign with algorithm agility, hierarchical key storage, and platform authorisation. fTPM / dTPM coexist.

TPM 2.0
2014

GSMA eUICC consumer specification

GSMA SGP.22 (consumer eSIM) standardised. The SIM moves from removable card to embedded provisionable element.

GSMA SGP.22
2017

M2M eSIM (GSMA SGP.02 → SGP.32)

Eventually GSMA SGP.32 modernises M2M eSIM provisioning for IoT use cases. The eUICC becomes a general-purpose telecom SE.

GSMA SGP.02 / SGP.32
2019

TPM 2.0 + Microsoft Pluton platform announcements

Embedded security processors begin to ship inside CPUs. The boundary between SE and CPU softens.

Pluton
2022

IoT-grade secure elements at scale

Purpose-built secure elements for connected devices: I²C / SPI interface, low power, attestation primitives, signed-firmware verification. The IoT SE category matures.

2024

Multi-applet SEs across form factors

A single CC EAL5+ secure element carries FIDO2 + PIV + OpenPGP + NDEF in card form, embedded MFF2 form, USB form, or nano-card form — AID-selectable.

2026

SE-anchored identity in every connected product

Authenticators, automotive identity, eMRTD chips, and IoT devices share one architectural pattern: tamper-resistant key custody in a secure element, attestation verified by a tenant-scoped service.

Building against this evolution?

If your roadmap touches any of these milestones, our engineering team can map the standards posture to a deployable architecture.

Talk to engineering