HONOR 400
From Wiki-IoT
Classification
| HONOR 400 | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2025-10-15 |
| Information | |
| Name | HONOR 400 |
| Brand by Parent | HONOR by HONOR |
| Generation | 4 |
| Model(s) | 400 |
| Release date | 2025-09-01 |
| Type/Category | mobile phone |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 156.3mm×74.7mm×7.8mm |
| Mass | 196g |
| Operating system | Android 15 |
| Companion App | MagicOS 9.0 |
| CPU | The fourth generation Snapdragon 7 mobile platform |
| GPU | Adreno 722 |
| Memory | 12GB |
| Storage | 256GB |
| Battery | Lithium polymer battery |
| Power | 7200mAh |
| Charging | 80W Honor Super Fast Charging (supports up to 20V/4A Super Fast Charging, compatible with 11V/6A or 10V/4A Super Fast Charging) |
| Display | FHD+ 2736x1264 |
| Camera | 200 million pixel wide-angle camera (f/1.9 aperture, supports OIS optical image stabilization)+12 million pixel ultra wide angle macro camera (f/2.2 aperture), supports autofocus |
| Sound | Number of speakers 2 of them |
| Connectivity | Type-C,USB 2.0 |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [] | The equipment adopts anti disassembly design and sealing technology, and there are relatively few cases of hardware tampering in public records. |
| Known vulnerabilities | Rare | [] | As of the evaluation, no serious public vulnerabilities have been found; The system regularly receives security patches. |
| Prior attacks | Rare | [] | There have been only a few reports of low-risk attacks in the past year, which have been mitigated through updates. |
| Updatability | Very common | [] | The device receives monthly security updates and supports seamless upgrades, with a user coverage rate of over 90%. |
| Category score | 2 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [] | Support multi factor authentication (such as fingerprint and facial recognition), and can be securely integrated with systems such as Google services. |
| Communications | Encrypted with up-to-date encryption | [] | All network communications are encrypted using AES-256 and TLS 1.3, in compliance with industry best practices. |
| Storage | Encrypted with up-to-date encryption | [] | The device is equipped with hardware level encryption (such as FBE), static data encryption, and key security management. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [] | Please note that the system supports self-service registration, email verification, and role-based access control based on permissions |
| Authentication | Secure | [] | Explanation: Authentication uses MFA (such as SMS verification code) and HTTPS encryption to prevent man in the middle attacks |
| Brute-force protection | Exist | [] | Note that the system locks the account after 5 failed login attempts and integrates CAPTCHA verification |
| Event logging | Access event logged | [] | The system records all login attempts (time, IP, results) and stores them on a secure server |
| Passwords | Require change after setup with complexity requirements | [] | Please note that the password requires a minimum length of 8 characters, including uppercase and lowercase letters and numbers. It must be changed upon first login. |
| Category score | 1 | ||
| Grade | A |
|---|