Apple’s Secure Enclave set a precedent in smartphone security that has so far been followed by many Android brands.

A new research study found that Huawei, Samsung, Xiaomi, OnePlus, Vivo, LG, Oppo, and Sony all now have models with equivalent embedded hardware security features…

Counterpoint Research said that most phones model their hardware security after the Secure Enclave, while Samsung and Google take slightly different approaches to achieve the same end result.

The Secure Enclave is a specific part of an A-Series chip used to store especially sensitive information. It is used to store the device passcode and biometric data, for Face ID or Touch ID, as well as Apple Pay data. Crucially, iOS itself cannot directly access data stored in the secure enclave, so even if malware could make its way onto an iPhone, it would have no access to the data.

Samsung implements a physically unclonable function (PUF), that serves as a unique identifier in the Exynos 9820 and 9825. Where Google takes a different approach by implementing a TPM (Trust Platform Module), a miniature version of a hardware security module (HSM) soldered into the PCBs of its Pixel series smartphones.

When you enter your passcode, for example, iOS has no idea whether it is correct. It instead passes the code you entered to the Secure Enclave that checks it against the encrypted version stored there, and then passes back a simple Yes or No to iOS. Exactly the same thing happens with Face ID and Touch ID: the actual checking is carried out within the Secure Enclave, and iOS just gets the OK or not.

Counterpoint notes that many smartphone brands get the feature because it’s embedded into the Qualcomm System on a Chip (SoC) used by many Android brands.

Counterpoint Research Vice President, Research, Neil Shah, noted: