TEE
SecurityTrusted Execution Environment -- an isolated execution area in a processor providing security for code and data.
TEE
A Trusted Execution Environment (TEETEESecurityIsolated secure execution environment.Click to view →) is an isolated execution area within a device's main processor that provides hardware-enforced separation between trusted (secure) and untrusted (normal) software. Built on ARM TrustZone or Intel SGX technology, a TEE runs a separate secure OS alongside the main operating system, protecting sensitive code and data from malware, OS vulnerabilities, and even privileged software running in the normal world.
TEE Architecture
The TEE divides the processor into two worlds:
| World | Description |
|---|---|
| Normal World (Rich OS) | Android, Linux, Windows — untrusted |
| Secure World (TEE) | Trusted OS (OP-TEE, Trusty, QSEE) — isolated |
Hardware mechanisms prevent normal-world software from accessing secure-world memory. The context switch between worlds is triggered by a Secure Monitor Call (SMC) instruction, managed by a secure monitor that acts as the gatekeeper.
TEE vs Secure Element
While both provide security isolation, TEEs and Secure Elements occupy different points on the security-performance spectrum:
| Attribute | TEE | Secure Element |
|---|---|---|
| Location | Inside main application processor | Separate dedicated chip |
| Performance | High (shares main CPU resources) | Low (card-grade processor) |
| Tamper resistance | Software/hardware isolation | Physical shielding + sensors |
| Certification | EAL 2-4 typical | EALEALSecuritySecurity evaluation depth rating (1-7).Click to view → 5+ / 6+ |
| Attack surface | Larger (shared silicon) | Minimal (dedicated die) |
| Cost | No additional hardware | Separate chip cost |
TEE in Smart Card Ecosystems
TEEs play a supporting role in smart card workflows, particularly in mobile payment and identity applications:
- Host Card Emulation (HCE): Payment tokens are stored in the TEE when no physical Secure Element is available, with cloud-based key management compensating for the lower hardware security level.
- Biometric Processing: Fingerprint and face recognition processing occurs in the TEE, with the final verification result passed to an SE-based payment or identity applet.
- Mobile ID: Government eIDeIDIdentityNational ID with embedded chip.Click to view → applications may use the TEE for user interface protection and secure display, while critical keys remain in the eSIMeSIMApplicationProgrammable embedded SIMSIMApplicationSmart card for mobile network authentication.Click to view → chip.Click to view → or embedded SE.
GlobalPlatform TEE Specifications
GlobalPlatform defines the TEE specifications, including the TEE Client API (for normal-world applications to call trusted applications), the TEE Internal Core API (for trusted application development), and the TEE management framework for trusted application installation and lifecycle. The GP TEE Protection ProfileProtection ProfileSecuritySecurity requirements document for CC.Click to view → (GPD_SPE_021) provides a Common Criteria-based certification path for TEE implementations.
Related Content
GlobalPlatform Card Management
Standards & Protocols…grants an exception via a signed token. Secure Element and TEE Interaction On devices with a TEE (Trusted Execution…
FIDO2 and Smart Cards
Standards & Protocols…. For the underlying secure element security model, see TEE vs Secure Element .
TEE vs Secure Element
SecurityTEE vs Secure Element Trusted Execution Environment ( TEE )…
Post-Quantum Cryptography for Smart Cards
Security…software implementation (reference) STM32Trust SLH-DSA in TEE Trusted Application Security Considerations Side-channel…
Smart Card in IoT
Industry Applications…SE for cellular M2M, connected vehicles, meters The TEE (Trusted Execution Environment) is a complementary…
FIPS 140 for Smart Card Products
ComplianceSmart Card Development Environment Setup
Developer Tools…mamt -load MyApp.aif -card <reader_id> The MULTOS TEE enforces strict inter-applet isolation; system calls are…
Smart Card Debugging Techniques
Developer Tools…: java -jar gp.jar --list --verbose --debug 2>&1 | tee trace.log # Output includes: # SND: 00A40400 07…
Questions fréquemment posées
The smart card glossary is a comprehensive reference of technical terms, acronyms, and concepts used in smart card technology. It covers protocols (APDU, T=0, T=1), security (Common Criteria, EAL, HSM), hardware (SE, EEPROM, contact pad), and applications (EMV, ePassport, eSIM). It serves developers, product managers, and engineers.
Yes. SmartCardFYI provides glossary definitions in 15 languages including English, Korean, Japanese, Chinese, Spanish, Portuguese, Hindi, Arabic, French, Russian, German, Turkish, Vietnamese, Indonesian, and Thai.