HONOR Play 9T
From Wiki-IoT
Revision as of 08:52, 27 September 2025 by XiaolongXiang (talk | contribs) (Created page with "{{Classification |name=HONOR Play9T |brand=HONOR |parent_company=HONOR |website=https://www.honor.com/cn/shop/product/10086961275033.html |release_date=2024-09-01 |generation=...")
Classification
| HONOR Play 9T | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | [[:Category:Calculator v|]] |
| Classification date | |
| Information | |
| Name | HONOR Play9T |
| Brand by Parent | HONOR by HONOR |
| Generation | 9 |
| Model(s) | Play9T |
| Release date | 2024-09-01 |
| Type/Category | mobile phone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 166.9mm*76.8mm*8.24mm |
| Mass | 199g |
| Operating system | Android 14 |
| Companion App | MagicOS 8.0 |
| CPU | The second generation Snapdragon 4 mobile platform |
| GPU | Adreno 613 |
| Memory | 8GB |
| Storage | 128GB |
| Battery | Lithium polymer battery |
| Power | 6000mAh |
| Charging | Support (maximum 11V/3.2A super fast charging) |
| Display | HD+ 1610*720 |
| Camera | 50 million main camera+2 million photosensitive depth of field |
| Sound | Number of speakers 2 of them |
| Connectivity | Type-C,USB 2.0 |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [] | The equipment adopts anti disassembly design and sealing technology, and there are relatively few cases of hardware tampering in public records. |
| Known vulnerabilities | Rare | [] | As of the evaluation, no serious public vulnerabilities have been found; The system regularly receives security patches. |
| Prior attacks | Rare | [] | There have been only a few reports of low-risk attacks in the past year, which have been mitigated through updates. |
| Updatability | Very common | [] | The device receives monthly security updates and supports seamless upgrades, with a user coverage rate of over 90%. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [] | Support multi factor authentication (such as fingerprint and facial recognition), and can be securely integrated with systems such as Google services. |
| Communications | Encrypted with up-to-date encryption | [] | All network communications are encrypted using AES-256 and TLS 1.3, in compliance with industry best practices. |
| Storage | Encrypted with up-to-date encryption | [] | The device is equipped with hardware level encryption (such as FBE), static data encryption, and key security management. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [] | Please note that the system supports self-service registration, email verification, and role-based access control based on permissions |
| Authentication | Secure | [] | Explanation: Authentication uses MFA (such as SMS verification code) and HTTPS encryption to prevent man in the middle attacks |
| Brute-force protection | Exist | [] | Note that the system locks the account after 5 failed login attempts and integrates CAPTCHA verification |
| Event logging | Access event logged | [] | The system records all login attempts (time, IP, results) and stores them on a secure server |
| Passwords | Require change after setup with complexity requirements | [] | Please note that the password requires a minimum length of 8 characters, including uppercase and lowercase letters and numbers. It must be changed upon first login. |
| Category score | 1 | ||
| Grade | A |
|---|