{"id":22408,"date":"2018-05-21T06:44:13","date_gmt":"2018-05-21T10:44:13","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=22408"},"modified":"2019-11-15T06:37:01","modified_gmt":"2019-11-15T11:37:01","slug":"secure-element","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/secure-element\/22408\/","title":{"rendered":"Secure Element\u00a0\u2014 securing contactless payments in smartphones"},"content":{"rendered":"<p>Modern smartphones have successfully combined the functionality of a phone, camera, music player, public transit pass, and even a wallet for many years now. Naturally, this makes you wonder about the security of the data they store. Let\u2019s figure out how well smartphones protect users\u2019 most valuable information and how their main security mechanism\u00a0\u2014 a tiny chip called Secure Element\u00a0\u2014 works.<\/p>\n<h2>Meet Secure Element<\/h2>\n<p>A special chip for storing secure payment information has migrated to smartphones from contactless credit cards. You may have heard of the EMV (Europay, MasterCard, Visa) standard, the most reliable standard today. With it, your payment information is stored on a protected microchip that is virtually impossible to hack. That\u2019s why cards that use the EMV standard are called, simply, \u201cchip cards.\u201d<\/p>\n<p>The Secure Element in your phone is essentially the same chip as the one used in credit cards. It has a separate operating system (yes, credit cards also have their own OS to run their programs). All of your information is stored on this chip, impossible to read or copy even by the phone\u2019s or tablet\u2019s OS, much less any apps installed on these devices. Secure Element will work only with special, trusted apps, such as select virtual wallets.<\/p>\n<p>The chip communicates directly with payment terminals, so even if a smartphone is infected by malware, hackers can\u2019t intercept this information, because the data is not transferred to the main OS but rather always remains in Secure Element\u2019s specialized system.<\/p>\n<h3>The phone wallet: How it all began<\/h3>\n<p>The idea of combining a phone with a credit card goes back further than you might think. The first models with a Secure Element installed were <a href=\"https:\/\/www.nfcworld.com\/nfc-devices\/nokia-6131-nfc\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">feature phones<\/a>, though they never became very popular. One company even invented a method of <a href=\"https:\/\/www.looppay.com\/about-us\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mimicking a magnetic stripe<\/a> with a gadget; however, phones became real competition for plastic cards only recently, in 2014, with the launch of Apple Pay.<\/p>\n<p>Apple Pay\u2019s success piqued the interest of its competitors, and in 2015, Samsung began offering a similar service. Both systems require Secure Element (that\u2019s why old iPhones and inexpensive Samsung models do not support contactless payments).<\/p>\n<p>In an attempt to improve the functionality of its devices, the Korean company even <a href=\"https:\/\/www.kaspersky.com\/blog\/samsung-pay-security\/7932\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">purchased<\/a> LoopPay, the same company that developed the magnetic stripe imitation technology. Several months later, Google introduced Android Pay (renamed Google Pay in early 2018).<\/p>\n<h3>Secure Element\u00a0\u2014 built-in, external, or cloud-based<\/h3>\n<p>In fact, Secure Element does not have to be built into a smartphone. It can be removable\u00a0\u2014 for example, in memory card format. Some mobile operators even produce SIM cards that can store your credit card or public transportation pass information. But these options never became popular.<\/p>\n<p>Google, as opposed to Apple or Samsung, primarily produces software for mobile devices and not the devices themselves. This is why their payment system encountered so many difficulties at the outset. Initially, most Android phones did not have Secure Element chips. The company could not force independent manufacturers to install the secure chip, or make users buy some new card. And it also couldn\u2019t implement contactless payments without Secure Element.<\/p>\n<p>At first, Google tried to find a way out of the situation and <a href=\"http:\/\/pocketnow.com\/2012\/03\/21\/google-wallet-gets-in-bed-with-carriers-editorial\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">install<\/a> its wallet app on SIM cards with Secure Element; however, leading American mobile phone operators \u2014 namely Verizon, AT&amp;T, and T-Mobile \u2014 refused to cooperate with the company, instead promoting their own app, which was initially called Isis Wallet but was later renamed Softcard because of political considerations. Remarkably, the result of all of this was Google acquiring the system for its patents.<\/p>\n<p>However, before that occurred, the company came up with an even more elegant solution to the problem. Though Android phones did not have physical secure chips installed, virtual ones were created in the cloud. The technology was called Host Card Emulation (HCE).<\/p>\n<p>This cloud-based system was different from wallets with built-in Secure Element chips in one important way. HCE requires the payment terminal to communicate with the gadget\u2019s OS. The OS must also make contact with a cloud Secure Element where payment information is stored, as well as with a trusted app.<\/p>\n<p>Experts state that using HCE is technically <a href=\"https:\/\/www.tomshardware.com\/news\/host-card-emulation-secure-element,28804.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">less secure<\/a> than using a real Secure Element: the more the data crosses the Internet, the easier it is to intercept. Nevertheless, HCE includes additional protection mechanisms that make up for this vulnerability\u00a0\u2014 for example, it uses not permanent payment keys but temporary ones that can be used only once.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n<h3>To be continued<\/h3>\n<p>Now you know about the \u201cblack box\u201d used to store payment data on your phone. In the next article, we\u2019ll discuss how Android and iOS devices use contactless payment systems based on Secure Element. We\u2019ll also talk about why one does not simply store a bank card on a smartphone without Apple Pay, Google Pay, or Samsung Pay being involved.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A look at how payment information is protected on smartphones that support contactless payments.<\/p>\n","protected":false},"author":2484,"featured_media":22409,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1789],"tags":[105,820,1175,1125,2939,1250,1013,2938,45,321],"class_list":{"0":"post-22408","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-android","9":"tag-apple-pay","10":"tag-contactless-payments","11":"tag-google-pay","12":"tag-host-card-emulation","13":"tag-ios","14":"tag-samsung-pay","15":"tag-secure-element","16":"tag-smartphones","17":"tag-technology"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-element\/22408\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/secure-element\/13354\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/secure-element\/11136\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-element\/15411\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-element\/13687\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/secure-element\/13003\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/secure-element\/16189\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/secure-element\/15752\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/secure-element\/20556\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/secure-element\/4996\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/secure-element\/10596\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/secure-element\/10424\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/secure-element\/9224\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/secure-element\/16797\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/secure-element\/9670\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/secure-element\/20379\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/secure-element\/20298\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/secure-element\/20295\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/smartphones\/","name":"smartphones"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22408"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22408\/revisions"}],"predecessor-version":[{"id":29723,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22408\/revisions\/29723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22409"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}