TEE

Security

Trusted Execution Environment -- an isolated execution area in a processor providing security for code and data.

Auch bekannt als: Trusted Execution Environment

TEE

A Trusted Execution Environment (TEETEESecurityIsolated secure execution environment.Click to view →) is an isolated execution area within a device's main processor that provides hardware-enforced separation between trusted (secure) and untrusted (normal) software. Built on ARM TrustZone or Intel SGX technology, a TEE runs a separate secure OS alongside the main operating system, protecting sensitive code and data from malware, OS vulnerabilities, and even privileged software running in the normal world.

TEE Architecture

The TEE divides the processor into two worlds:

World Description
Normal World (Rich OS) Android, Linux, Windows — untrusted
Secure World (TEE) Trusted OS (OP-TEE, Trusty, QSEE) — isolated

Hardware mechanisms prevent normal-world software from accessing secure-world memory. The context switch between worlds is triggered by a Secure Monitor Call (SMC) instruction, managed by a secure monitor that acts as the gatekeeper.

TEE vs Secure Element

While both provide security isolation, TEEs and Secure Elements occupy different points on the security-performance spectrum:

Attribute TEE Secure Element
Location Inside main application processor Separate dedicated chip
Performance High (shares main CPU resources) Low (card-grade processor)
Tamper resistance Software/hardware isolation Physical shielding + sensors
Certification EAL 2-4 typical EALEALSecuritySecurity evaluation depth rating (1-7).Click to view → 5+ / 6+
Attack surface Larger (shared silicon) Minimal (dedicated die)
Cost No additional hardware Separate chip cost

TEE in Smart Card Ecosystems

TEEs play a supporting role in smart card workflows, particularly in mobile payment and identity applications:

  • Host Card Emulation (HCE): Payment tokens are stored in the TEE when no physical Secure Element is available, with cloud-based key management compensating for the lower hardware security level.
  • Biometric Processing: Fingerprint and face recognition processing occurs in the TEE, with the final verification result passed to an SE-based payment or identity applet.
  • Mobile ID: Government eIDeIDIdentityNational ID with embedded chip.Click to view → applications may use the TEE for user interface protection and secure display, while critical keys remain in the eSIMeSIMApplicationProgrammable embedded SIMSIMApplicationSmart card for mobile network authentication.Click to view → chip.Click to view → or embedded SE.

GlobalPlatform TEE Specifications

GlobalPlatform defines the TEE specifications, including the TEE Client API (for normal-world applications to call trusted applications), the TEE Internal Core API (for trusted application development), and the TEE management framework for trusted application installation and lifecycle. The GP TEE Protection ProfileProtection ProfileSecuritySecurity requirements document for CC.Click to view → (GPD_SPE_021) provides a Common Criteria-based certification path for TEE implementations.

Häufig gestellte Fragen

The smart card glossary is a comprehensive reference of technical terms, acronyms, and concepts used in smart card technology. It covers protocols (APDU, T=0, T=1), security (Common Criteria, EAL, HSM), hardware (SE, EEPROM, contact pad), and applications (EMV, ePassport, eSIM). It serves developers, product managers, and engineers.

Yes. SmartCardFYI provides glossary definitions in 15 languages including English, Korean, Japanese, Chinese, Spanish, Portuguese, Hindi, Arabic, French, Russian, German, Turkish, Vietnamese, Indonesian, and Thai.