HONOR Play 60

From Wiki-IoT


Classification

HONOR Play 60
Classification
Grade A
Calculator version 1
Classification date 2025-10-10
Information
Name HONOR Play 60
Brand by Parent HONOR by HONOR
Generation 60
Model(s) Play 60
Release date 2025-04-01
Type/Category mobile phone
Website [1]
Status In sale
More
Dimensions 163.95*75.6*8.39mm
Mass 197g
Operating system Android 15
Companion App Magic OS 9.0
CPU Tianji 6300
GPU G57 MC2
Memory 6GB
Storage 128GB
Battery Lithium polymer battery
Power 6000mAh
Charging Standard 5V3A
Display 720*1604
Camera 13 million pixel main camera (f/1.8 aperture)
Sound Number of speakers 1 of them
Connectivity Type-C,USB 2.0
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [] The equipment adopts anti disassembly design and sealing technology, and there are relatively few cases of hardware tampering in public records.
Known vulnerabilities Rare [] As of the evaluation, no serious public vulnerabilities have been found; The system regularly receives security patches.
Prior attacks Rare [] There have been only a few reports of low-risk attacks in the past year, which have been mitigated through updates.
Updatability Very common [] The device receives monthly security updates and supports seamless upgrades, with a user coverage rate of over 90%.
Category score 2
System
Criterion Value Proof(s) Comment
Authentication with other systems Full [] Support multi factor authentication (such as fingerprint and facial recognition), and can be securely integrated with systems such as Google services.
Communications Encrypted with up-to-date encryption [] All network communications are encrypted using AES-256 and TLS 1.3, in compliance with industry best practices.
Storage Encrypted with up-to-date encryption [] The device is equipped with hardware level encryption (such as FBE), static data encryption, and key security management.
Category score 1
User Authentication
Criterion Value Proof(s) Comment
Account management Full [] Please note that the system supports self-service registration, email verification, and role-based access control based on permissions
Authentication Secure [] Explanation: Authentication uses MFA (such as SMS verification code) and HTTPS encryption to prevent man in the middle attacks
Brute-force protection Exist [] Note that the system locks the account after 5 failed login attempts and integrates CAPTCHA verification
Event logging Access event logged [] The system records all login attempts (time, IP, results) and stores them on a secure server
Passwords Require change after setup with complexity requirements [] Please note that the password requires a minimum length of 8 characters, including uppercase and lowercase letters and numbers. It must be changed upon first login.
Category score 1
Grade A