35% of Smartphones Sold in H1 2020 Had Embedded Hardware Security, Apple Leads With 39% Market Share

Seoul, Hong Kong, New Delhi, Beijing, London, Buenos Aires, San Diego – January 29, 2021

Apple and Huawei implement embedded hardware security through a secure element (eSE/inSE).
Samsung uses a physically unclonable function (PUF).

Hardware security was embedded in 35% of the smartphones sold globally in H1 2020, according to the latest research from Counterpoint’s Component Practice. This share is expected to reach 38% in 2021. Apple led the secure chipset market in H1 2020 with 39% share.

Commenting on smartphone security, Research Analyst Parv Sharma said, “Smartphones have become vulnerable to attacks. We use them for banking, financial transactions, biometrics, user data and even as digital keys for smart homes and automobiles. Therefore, the need for hardware security in smartphones is stronger than ever.”

Sharma added, “Hardware security is being adopted not only in the premium segment smartphones but has trickled down to the mid-segment as well. The sales of secure smartphones declined 6% in H1 2020 compared to H1 2019. The decline is due to the outbreak of COVID-19 pandemic, which led to reduced overall smartphone sales in H1 2020.”

Exhibit 1: Global Sales of Smartphones with Embedded Hardware Security: Market Share in H1 2020 vs H1 2019

Counterpoint Research Global smartphone sales by model tracker 2020
Source: Counterpoint Research – Global Secure Smartphone Sales by Model Tracker, 2020

Commenting on the competitive landscape in the secure chipset market, Research Vice President Neil Shah said, “Hardware-backed security (strong box) means that keys are stored in the secure element, which is a separate microchip. , a trusted execution environment (TEE) is a secure area of the main processor which runs its OS and communicates with the main OS via a restricted interface. The strong box approach is more secure. Chipset OEMs have embedded eSE their SoC. Apple’s portfolio for 2020 has an embedded secure element in the A Series chipsets. Apple led the secure chipset market with 39% share in H1 2020.”

Shah added, “Huawei has also implemented an integrated secure element (inSE) in its SoCs. But its share will decline due to US restrictions. Qualcomm has adopted a secure element as a secure processing unit (SPU) in the Snapdragon 800 Series. It has also trickled down to the Snapdragon 700 Series in the mid-end segment. Samsung implements a physically unclonable function (PUF) which serves as a unique identifier. Samsung has also used a Quantum Random Number Generator (QRNG) in the Galaxy A Quantum to make the device more secure.”

Exhibit 2: Global Sales of Smartphones with Embedded Hardware Security by SoC Vendor, H1 2020 (Excluding TPM)

Counterpoint Research Secure smartphone share by chipsetThe comprehensive and in-depth report on “Global Secure Smartphone Sales by Model Trackeris a part of our Security service. The report is available for download here.


Counterpoint Technology Market Research is a global research firm specializing in products in the TMT (technology, media and telecom) industry. It services major technology and financial firms with a mix of monthly reports, customized projects and detailed analyses of the mobile and technology markets. Its key analysts are experts in the high-tech industry with an average tenure of 15 years.

Analyst Contacts:

Parv Sharma

Neil Shah

Peter Richardson

Counterpoint Research

Counterpoint research is a young and fast growing research firm covering analysis of the tech industry. Coverage areas are connected devices, digital consumer goods, software & applications and other adjacent topics. We provide syndicated research reports as well as tailored. Our seminars and workshops for companies and institutions are popular and available on demand. Consulting and customized work on the above topics is provided for high precision projects.

Term of Use and Privacy Policy

Counterpoint Technology Market Research Limited


In order to access Counterpoint Technology Market Research Limited (Company or We hereafter) Web sites, you may be asked to complete a registration form. You are required to provide contact information which is used to enhance the user experience and determine whether you are a paid subscriber or not.
Personal Information When you register on we ask you for personal information. We use this information to provide you with the best advice and highest-quality service as well as with offers that we think are relevant to you. We may also contact you regarding a Web site problem or other customer service-related issues. We do not sell, share or rent personal information about you collected on Company Web sites.

How to unsubscribe and Termination

You may request to terminate your account or unsubscribe to any email subscriptions or mailing lists at any time. In accessing and using this Website, User agrees to comply with all applicable laws and agrees not to take any action that would compromise the security or viability of this Website. The Company may terminate User’s access to this Website at any time for any reason. The terms hereunder regarding Accuracy of Information and Third Party Rights shall survive termination.

Website Content and Copyright

This Website is the property of Counterpoint and is protected by international copyright law and conventions. We grant users the right to access and use the Website, so long as such use is for internal information purposes, and User does not alter, copy, disseminate, redistribute or republish any content or feature of this Website. User acknowledges that access to and use of this Website is subject to these TERMS OF USE and any expanded access or use must be approved in writing by the Company.
– Passwords are for user’s individual use
– Passwords may not be shared with others
– Users may not store documents in shared folders.
– Users may not redistribute documents to non-users unless otherwise stated in their contract terms.

Changes or Updates to the Website

The Company reserves the right to change, update or discontinue any aspect of this Website at any time without notice. Your continued use of the Website after any such change constitutes your agreement to these TERMS OF USE, as modified.
Accuracy of Information: While the information contained on this Website has been obtained from sources believed to be reliable, We disclaims all warranties as to the accuracy, completeness or adequacy of such information. User assumes sole responsibility for the use it makes of this Website to achieve his/her intended results.

Third Party Links: This Website may contain links to other third party websites, which are provided as additional resources for the convenience of Users. We do not endorse, sponsor or accept any responsibility for these third party websites, User agrees to direct any concerns relating to these third party websites to the relevant website administrator.

Cookies and Tracking

We may monitor how you use our Web sites. It is used solely for purposes of enabling us to provide you with a personalized Web site experience.
This data may also be used in the aggregate, to identify appropriate product offerings and subscription plans.
Cookies may be set in order to identify you and determine your access privileges. Cookies are simply identifiers. You have the ability to delete cookie files from your hard disk drive.