HONOR Play 60
From Wiki-IoT
Classification
HONOR Play 60 | |
---|---|
Classification | |
Grade | A |
Calculator version | 1 |
Classification date | 2025-10-10 |
Information | |
Name | HONOR Play 60 |
Brand by Parent | HONOR by HONOR |
Generation | 60 |
Model(s) | Play 60 |
Release date | 2025-04-01 |
Type/Category | mobile phone |
Website | [1] |
Status | In sale |
More | |
Dimensions | 163.95*75.6*8.39mm |
Mass | 197g |
Operating system | Android 15 |
Companion App | Magic OS 9.0 |
CPU | Tianji 6300 |
GPU | G57 MC2 |
Memory | 6GB |
Storage | 128GB |
Battery | Lithium polymer battery |
Power | 6000mAh |
Charging | Standard 5V3A |
Display | 720*1604 |
Camera | 13 million pixel main camera (f/1.8 aperture) |
Sound | Number of speakers 1 of them |
Connectivity | Type-C,USB 2.0 |
Device | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Known hardware tampering | None | [] | The equipment adopts anti disassembly design and sealing technology, and there are relatively few cases of hardware tampering in public records. |
Known vulnerabilities | Rare | [] | As of the evaluation, no serious public vulnerabilities have been found; The system regularly receives security patches. |
Prior attacks | Rare | [] | There have been only a few reports of low-risk attacks in the past year, which have been mitigated through updates. |
Updatability | Very common | [] | The device receives monthly security updates and supports seamless upgrades, with a user coverage rate of over 90%. |
Category score | 2 |
System | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Authentication with other systems | Full | [] | Support multi factor authentication (such as fingerprint and facial recognition), and can be securely integrated with systems such as Google services. |
Communications | Encrypted with up-to-date encryption | [] | All network communications are encrypted using AES-256 and TLS 1.3, in compliance with industry best practices. |
Storage | Encrypted with up-to-date encryption | [] | The device is equipped with hardware level encryption (such as FBE), static data encryption, and key security management. |
Category score | 1 |
User Authentication | |||
---|---|---|---|
Criterion | Value | Proof(s) | Comment |
Account management | Full | [] | Please note that the system supports self-service registration, email verification, and role-based access control based on permissions |
Authentication | Secure | [] | Explanation: Authentication uses MFA (such as SMS verification code) and HTTPS encryption to prevent man in the middle attacks |
Brute-force protection | Exist | [] | Note that the system locks the account after 5 failed login attempts and integrates CAPTCHA verification |
Event logging | Access event logged | [] | The system records all login attempts (time, IP, results) and stores them on a secure server |
Passwords | Require change after setup with complexity requirements | [] | Please note that the password requires a minimum length of 8 characters, including uppercase and lowercase letters and numbers. It must be changed upon first login. |
Category score | 1 |
Grade | A |
---|