123 Main Street, New York, NY 10001

Index for device types (SE/TPM/eSE/eSIM/mini-HSM/PUF), core capabilities (keys, secure storage, crypto, attestation, boot, access control, tamper), interfaces & stacks, compliance, use cases, key specs, TPM essentials, provisioning lifecycle, and design pitfalls with quick pairings.

Device Types

UICC / eUICC (eSIM)

GlobalPlatform/GSMA RSP with SCP session keys for cellular identity and remote configuration.

Capabilities

Key Management

TRNG, key gen/store/rotate/destroy; wrap/unwrap, KDFs and key ladders.

Secure Storage

Authenticated NVM with monotonic counters/anti-rollback and atomic (anti-tearing) writes.

Crypto Engines

AES-GCM/CCM, SHA-2/3, RSA, ECC (P-256/384/ed25519), HMAC/KMAC accelerators.

Access Control

PIN/policy sessions, roles and lifecycle states (FAB/TEST/PROD/RMA).

Tamper Resistance

Voltage/clock/temp/light/probe/glitch sensors with erase; SCA/FI countermeasures.

Interfaces & Stacks

Host Interfaces

I²C/SPI/ISO7816 (T=0/T=1), SPI-TPM (TIS over SPI/I²C) and occasionally USB.

Security Standards

GlobalPlatform (SCP03/TEE), TCG TPM2.0, PKCS#11, FIDO2/U2F, Matter DAC/PAI, DLMS security.

Cloud Onboarding

802.1AR DevID/CSR and device attestation into cloud certificate issuance & registration.

Compliance & Certifications

FuSa / Automotive

AEC-Q100 and ASIL documentation in gateway/TCU identity scenarios.

Use Cases

Smart Metering

DLMS suites, monotonic energy counters and signed anti-tamper logs.

Key Specs & Selection

TRNG Quality

On-line health tests and SP 800-90B evaluations.

Tamper Grade

Sensor coverage and SCA/FI resistance levels.

Host Ecosystem

TPM2-TSS/PKCS#11 support, drivers and reference middleware.

Cert & Longevity

CC/FIPS/EMVCo versions, automotive grades and second sourcing.

TPM 2.0 Essentials

EK / SRK / AK

EK certificate chains, SRK-wrapped keys and AK for attestation.

Policy Sessions

Use PolicyPCR/PolicyAuthorize for fine-grained access control.

Common Use Cases

BitLocker/disk encryption, measured boot, RA (Quote) and cert/CSR protection.

Provisioning & Lifecycle

Key Ceremony

CA/HSM generate roots/intermediates; factory HSM issues device certs/keys.

Personalization

Set lifecycle/lock debug, inject cert chains/policies and log traceable IDs.

OTA & Rotation

Rotate certs/keys; align firmware signing and anti-rollback counters.

Design Hooks & Pitfalls

TRNG Health

TRNG failure breaks all security—enable health tests and entropy monitoring.

Debug Ports

Permanently lock JTAG/SWD/UART pre-production; keep a secure RMA path.

Trusted Time

RA/cert checks need trusted time (secure RTC/timestamps).

Power & Reset

Stable power-up; avoid glitch resets and half-writes; isolate I²C pull-ups from injection paths.

Supply Chain

Use CC/FIPS/EMVCo-certified parts/lines; plan second source and cross-vendor cert migration.

Quick Pairings

IoT Secure Access

SE (I²C) + 802.1AR DevID + TLS client auth + secure boot + OTA anti-rollback.

Industrial Gateway

TPM2.0 (SPI) + PCR measurements + disk encryption + RA into zero-trust networks.

Payments / Access

eSE + EMVCo/GlobalPlatform applets + NFC + cloud-side risk control.

Smart Meter

SE + DLMS suite + monotonic counters + anti-tamper logs + AMI integration.