FAQ
GENERAL INQUIRY
Common FAQ
Technical FAQ
Tracksolid FAQ
NIST8259 FAQ
Is The GPS Default Status Is Off?
Yes. To turn on it, you can either set GPS time (5-300 minutes) or send command “GPSON, T#”.
Except From SOS Number, Can Any Other Number Dial The Device?
Whatever number can dial the device when SOS number is not set. But after SOS number set, the device can only be dialed by SOS number.
How To Turn On GPS?
Activate GPS in a fixed time Trigger SOS emergency dial Send SMS command “ POSITION# WHERE# URL#”
How Long Can The Device Work?
It varies from different item battery. You can check the specification page of the corresponding item number on our site.
GPS Is Turned On, But It Can’t Be Positioning, Why?
Stay in the room, under the tree or keep still for a long time may affect GPS signal reception. Whether GPS is shielded or not. (e.g., near military region or community) Overhaul needed when device still can’t be positioning even the signal is strength.
When Calling, Why It Warns That The Device Is Power Off?
Your SIM card should be valid. Please check whether the SIM card is incorrectly inserted. Observe indicator light. If network indicator is dark, this problem may be caused by SIM card, you can change another one and have a test. If this still can’t work, please return the device to factory to get an overhaul.
How Do I Set Up Text Message Alerts For My Tracker?
In order to get text messages sent to your phone when your tracker enters / exits a geofence, you need to add your cell phone number into the tracking app. You can do this with the mobile app or through the web tracking app.
I Just Got My Tracker. How Do I Get Started?
To get started, first make sure your tracker is completely charged and powered on. It may take a moment for your tracker to connect to the cell network and get a GPS fix for the first time. You will want to download the tracking app for your smartphone (or you can use the web tracking app, tracksolid.com). For some trackers, there are additional features available only in the mobile app. You can log in with the e-mail address and password you chose when you purchased or activated your tracker.
Once your tracker is powered on, it should update the map view and display it's current position. In order to access the Live audio features, you will need to set your cell phone as the authorized number.
Why Isn’t My Tracker Updating?
There are a few reasons a tracker might not be updating it’s position on the map. The first thing to check is that the tracker is charged and powered on. Next, make sure the tracker is placed somewhere it can get GPS signal. Trackers get their location from GPS satellites, so they can’t be inside a metal enclosure like a trunk or toolbox. Also, they may not be able to get a GPS fix inside a metal building, an underground parking deck, etc. So if your tracker isn’t reporting, there is a possibility that it just doesn’t know where it
How Can I Track My Cars/Assets/People?
First you need to pick the devices that meet your demands, follow the instructions on the user manual to connect the device. You can use the Tracksolid/Car-Matrix Web platform to checkout latest location and status from your cars/assets/people. Apps for Android/iOS phones are also available. Just click Demo on the Login page, then you can have a try.
Why Is The Device Offline?
- If you are using Asset Tracker or Personal Tracker series, there will be power saving mode in which the device will be sleeping during fixed time interval. Please confirm if the device is in those modes.
- Another issue would be the signal strength around the device. If the device is deep down at a parking lot, or surrounded by crowded buildings, tunnels, the signal would be worse than usual, and the odds that device go offline would be higher. You can also cross-check with your cellphone for the signal coverage.
- Check the installation. Please do not install the device where it will be surrounded by metal material, because metal cover will significantly affect the network and GPS signal strength.
- Check SIM card balance. Recharge the balance to enable Internet access.
- Check the battery life and/or the power supply circuit for the device. Make sure device is power on and stably powered.
If you failed to get the device online after above steps, please contact Jimi for technical support.
Why I Can’t Get A GPS Location Update?
Please make sure you are not testing the device indoor. In some area like inside the buildings, thick forests, in the garage or parking lot, GPS signal will be too weak to fix a location. But there will be LBS or WIFI positioning available, according to different devices. When the car is parked or the device is not moving for a while, it will not update location. If you wish the device update locations at all time, please refer to the command lists, or contact Jimi staff. Some trackers may have their logics to shutdown GPS module for power saving.
How Does The Jimi GPS Tracker Work?
Our GPS Tracking devices contain two modules: 1. GPS module: This module will allow the locator device to get its location from the GPS satellites. 2. Cellular module: This module acts almost as a cell phone. It transmits the information received from the GPS module to the cellular networks and from there to our servers.Once the information is received in our servers, special software processes it and presents it to you in our GPS Tracking web system.
What Affects GPS Accuracy?
Many factors affect how accurate your GPS is. The atmosphere, the ionosphere and the position of your receiver could all affect GPS accuracy. Any buildings, natural structures or heavy foliage that obstructs the GPS’ view of the sky may decrease the position accuracy.
Does Jimi GPS Tracker Need A SIM Card?
Yes, think of your tracker as another phone. You insert a SIM card and that phone number is where you send your text messages to.
How Can I Change IMEI?
Sorry, IMEI is unique and cannot be changed.
I Am Unable To Get My First Location For More Than 2 Minutes, What Could Be The Problem?
1. There should be no nearby tall buildings or houses. 2. Antenna signal will not pass through metallic or magic type tint. 3. Vehicle should not be moving when trying to get your first fix. 4. Units should not be placed or covered behind metal objects. 5. Acquiring your first location should take only 30 seconds to 1 minute with a good GPS signal in the area. Should the acquiring of a signal take too long, simply remove the unit’s power and re-insert it again – this re-starts the search process.
Why Are My Maps Not Displaying?
If the GSM network is available,your device will turn to LBS location when you enter the builiding , the accuracy not accurate as GPS location. Once outside and get GPS singals, it will start to upload your GPS location again. The same applies to tunnels.
How To Change Base Station Positioning To Satellite Positioning?
The device will automatically switch to base station positioning if satellite signal is weak. To use satellite positioning, please ensure the signal is good and there is no metal material above the device.
How To Cancel Vibration Alert?
Use SOS to send “000” to disarm. Use SOS call number to dial SIM card number and hang up within 10 seconds, then you will get a message saying the device disarm automatically.
Why The Device Is Unable To Monitor?
SIM card should have caller ID service. The device is monitoring only if the SOS number is already set.
How To Set SOS Number?
To set SOS number, you can send “SOS, A, phone number#” to device and then reply “OK”.
How Can I Integrate Jimi Products On My Own Server?
We will offer communication procedures and protocols documentation of the device, which will help the server talk to the device. Any further assistance on the integration, please contact Jimi staff.
Why Is The GPS Location Drifting?
GPS signal can be affected by various factors: Bad weathers like rain/snow/thunder storm, extreme temperature The surrounding buildings or hills/mountains, bad installation method and position, etc. If the device is under those conditions, the position would be less accurate. If the device location keeps drifting all the time, please contact Jimi staff for support.
How To Get Jimi Devices Online?
To get the device connected, you will need a SIM card with SMS feature and Internet access. Insert the SIM card and power ON the device, then normally the device will self-adapt the correct APN setting of the SIM card, and connect to the Internet. The device is configured to connect the Tracksolid/Car-Matrix server by default. If unfortunately, the APN setting cannot be adapted, you can also manually set them by SMS command. For Trackers, useAPN, apnname, user, password# command. See the user manual document for more detail.
What If I Am Outside GSM Coverage Area?
Your device will store up outgoing messages until it is connected to the GSM network. When the GSM network resumes the data will stream back to server. Nothing will miss.
How Do I Access My Account?
You will be provided with an online account and given a personal login and password of your choice. You will also be given the website address of your GPS tracking website. Any computer with a working standard Internet browser is required to login and locate your vehicle.
How To Switch The GPS Mode And LBS Mode?
When GPS is positioning, its icon is still (full signal) and will be turned off in 20 seconds. If GPS is not positioning, it turns off in 5 minutes and starts again in 30 minutes. GPS works 20 minutes when it is activated by platform and SOS alert. Otherwise, GPS turns off after 20 seconds positioning. Even GPS is not positioning, it will turn off in 5 minutes. When GPS doesn’t work, it switches to LBS mode.
How To Renew The Inactive Device?
Inactive device does not support renewal on platform.
Where Can I Modify The User Expiration Time?
The sales account can modify the user expiration time on the device management page. On the “device” page, find the device, click update user expiration date, and modify the user expiration date.
Why Does Not Receive The Verification Email When Registering And Changing The Account Password?
1. Please check the mail trash box.
2. Check if the mailbox has a blacklist.
How To Add Device On Tracksolid?
There are two methods. 1. Provide IMEI to Jimi, we will import it. 2. Customers can purchase import card and operate by themselves.
How To Create Tracksolid Account?
On the account menu, you can add the customer, input username, login account, password and other info you need. There are two types of accounts: dealers and end users. Tracksolid dealer account can create sub-accounts, manage and set device expiration times. End users account do not have this permission.
What Is The Tracksolid Gps Price?
It depends on your devices amounts and years use, more details should be contact your upper account.
Why Tracksolid Device Does Not Exist?
The device has not imported to the platform, please provide your IMEI to your upper account and then can deal with it correspondingly.
What Is Tracksolid Lifetime?
The First Year Use means you can use our platform “Tracksolid” for one year. Lifetime Use means you can use our platform “Tracksolid” for 10 years.
Could You Provide Tracksolid API?
Our latest version Tracksolid API is here.
How To Use Tracksolid On PC And Mobile?
If you want tracksolid for PC, please click www.tracksolid.com If you want to down tracksolid app, please scan the QR code.
What To Do When The Platform Doesn’t Update Location?
Issue command “check location” on the platform to query new location. If the location returned deviate from the location displayed on the platform, that means something is wrong with the platform. Please contact us for support.
Do You Have Guidance For The Platform?
Yes, after you login, just click “Help ” on the upper right corner in page, then you can have yourself guided.
Do Tracksolid/Car-Matrix Platform Have Open APIs?
Yes we have, and you will need an account on those platform to use those APIs. Contact our staff for the document and more detail.
What Types Of Tracking Systems Are There?
There are two types of GPS Tracking Systems: a. Real Time tracking systems: This type of system will collect the information of the vehicle and send it immediately or every 30 seconds to the servers that will process the information. This type of system is ideal when it is a priority to have an on-line, instant control of the vehicles activities. b. Passive tracking systems: This type of system will collect the information of the vehicle and store in the memory of the GPS device. It is ideal for those cases when requirements are less strict.
Which Types Of People Are Expected Customers For This Device?
The expected users of device are all consumers or for car driver or anyone need to record the driving condition and protect their assets. The expected organizations of device include individual home users, enterprises and governments, etc. Device would be mainly used in consumer’s vehicle.
Which Types Of Organizations Are Expected Customers For This Device?
Individual home users, small retail businesses, taxi operating companies, car insurance companies,logistics companies and commercial fleets, etc.
How Will The Device Be Used?
For recording the driving condition, monitoring driving behaviours, deterring crime, recording bad motorists, and more quickly resolving disputes resulting from traffic accidents.
Where Geographically Will The Device Be Used?
More than 60 key sales countries and regions in the world.
What Physical Environments Will The Device Be Used In?
Inside different kinds of vehicles.
How Long Is The Device Expected To Be Used For?
The device is expected to be used for 3 years. Jimiprovides a 13-month warranty for all tracking and DVR devices. App upgrades at least once every 2 weeks and the firmware for products on sale upgrade at least once every 3 months.
What Dependencies On Other Systems Will The Device Likely Have?
The device can work independently. For remote operations, it must connect to internet (Cloud).
Will Customers Have To Communicate With You As The Manufacturer?
Any problems can be submitted to this site: Report a Vulnerability
How Will The IoT Device Interact With The Physical World?
Remote engine cut-off,I/O ports to support multiple external types of equipment for various applications, Video/audio recording and upload to the server.
How Will The IoT Device Need To Be Accessed, Managed, And Monitored By Authorized People, Processes, And Other Devices?
Besides controlling device physically, only device’s owner can remotely control the device via Tracksolid PRO application. There is an authentication mechanism in application to prevent unauthorized user to control device. All remote communications are protected using cryptographic methods to ensure only device’s owner has the permission for controlling. Only customers can control the device, manufacturer can manage the running status of the device and provide upgrades.
What Are The Known Cybersecurity Requirements For The IoT Device?
Not found yet.
How Might The IoT Device’s Use Of Device Cybersecurity Capabilities Be Interfered With By The Device’s Operational Or Environmental Characteristics?
If using a publicly accessible network to connect the device with Jimi cloud, it needs to ensure that the network state is secure. OTA updates have a breakpoint continuation mechanism and the ability to roll back a previously available state.
At unattended state, the IoT device is vulnerable to physical attack. But the risks of products are manageable because of their work environment is inside the car and the installation is covered.
What Is The Degree Of Trust In The IoT Device That Customers May Need?
Communication protocols follow the principles of confidentiality, integrity and availability. There is an authentication mechanism for communication between device and APP, device and cloud, and cloud and APP. The session key is obtained through TLS1.2 handshake. TLS 1.2 is used for integrity verification during data transmission. And local data is stored in encryption, such as the account and password of AP is encrypted with Root Key, which is derived from the IMEI of the chip hardware. In general, Jimi uses strong secure cryptographic algorithms and secure protocol to protect all the traffic between device and cloud, device and application.
What Complexities Will Be Introduced By The IoT Device Interacting With Other Devices, Systems, And Environments?
It does not add complexity to other devices, systems or environments. When the user uses the device, the device will only interact with the mobile APP and the cloud server without affecting other devices and systems. The function of the device itself is to improve the physical environment without complicating it.
List The Configuration’s Settings That Can Be Modified. List The User Profiles. List The Mapping Between User Profiles And Access Rights For Configuration Settings.
1. The production firmware file is burned in the device, and no other configuration files need to be changed during use.
2. Only device’s owner have remote access to the device as there is relationship binding during initialization.
How Do You Protect The Configuration From Unauthorized Modification?
The debug interface has been closed, and unauthorized users cannot access it, and Wi-Fi and BLE interface can’t be access without authorization. 1.Physical protection: There isn’t any external interfaces on device that allows reading / writing firmware data or configuration data. 2.Network connection protection: There is authentication mechanisms sitting in both cloud, application and device to prevent any malicious/unauthenticated connections.
What Is The Secure Default Configuration (If Applicable For The Device)? Who Defines It?
The device factory setting is a secure default configuration, the DVR performs predetermined functions according to the default configuration, and the attacker cannot access the device without authorization, the secure default configuration is defined by manufacturer.
Does The Device Generate Logs Or Notifications Of Security Events? List The Types Of Security Events That Are Generated. If Not, Can The Device Indicate A Cybersecurity Status (E.G., Through Notifications)? List The Status Information.
The module has a log reporting mechanism, which only supports error log reporting at present. The crash log includes the connection fail info of the router or server, etc. The mechanism is not a real-time reporting. After login on the server, upload the crash log. And the log data can be viewed through the backend.
Who Can Review The Logs Or Notifications? Please Describe The Authentication And Authorization Procedures To Protect The Logs And Notifications From Unauthorized Access?
If different storages are used, please describe the authentication and authorization procedures respectively. Due to limited local storage capacity, the device does not store log information locally, but uploads it to cloud storage through an encrypted channel. In the cloud service, only the database management account has the authority to view log information. If the account is not authorized, access to the device log information is prohibited.
Please Describe The Method To Prevent Any Entity From Editing The Logs.
Setting the properties of the database to read-only permissions, and the unauthorized users cannot log in and modify data.
Has An Established IoT Platform Been Used Instead Of Acquiring And Integrating Individual Hardware And Software Components?
The equipment development is based on Android go, and the cloud service is built on the Ali cloud platform. Using these existing mature hardware or software components will help reduce security threats.
Are Any Of The Device Cybersecurity Capabilities Hardware-Based?
The device uses a hardware true random number generator (TRNG) to generate a true random number as the ROOT_KEY, and then save the ROOT_KEY in efuse.
Does The Hardware, Firmware, Or Software (Including The Operating System) Include Unneeded Device Capabilities With Cybersecurity Implications? If So, Can They Be Disabled To Prevent Misuse And Exploitation?
The source code is compiled and burned to the device; source code is not involved during the use of the device. The debug interface has been closed, and unauthorized users cannot access it. JIMI developers use Git to control source code of the device, and it implement session control, access control, all these functions can protect device code from unauthorized access and tampering.
How Is IoT Device Code Protected From Unauthorized Access And Tampering?
The source code is compiled and burned to the device; source code is not involved during the use of the device. The debug interface has been closed, and the unauthorized users cannot access it. Jimi developers use Git to control source code of the device, and it implement session control, access control, all these functions can protect device code from unauthorized access and tampering.
How Can Customers Verify Software Integrity For The IoT Device?
The user does not need to verify the integrity of the device software, and the integrity is guaranteed by the device itself.
What Verification Is Done To Confirm That The Security Of Third-Party Software Used Within The IoT Device Meets The Customers’ Needs?
Manually source code reviewing to ensure the safety of third-party components.
What Measures Are Taken To Minimize The Vulnerabilities In Released IoT Device Software?
1. Turn off unnecessary network and logical interfaces.
2. Prohibit network interfaces from leaking security-related information. 3. Disable network/ADB debug interfaces.
What Measures Are Taken To Accept Reports Of Possible IoT Device Software Vulnerabilities And Respond To Them?
We can receive possible vulnerability reports through Jimi IoT Security Centre (https://www.Jimilab.com/security/) and provide relevant information to the reporter.
What Processes Are In Place To Assess And Prioritize The Remediation Of All Vulnerabilities In IoT Device Software?
JimiIoT security team will evaluate the severity of all collected vulnerabilities, and determine the processing priority level based on the risk assessment results of the vulnerabilities in the product, and response to and repair the vulnerabilities in a timely manner according to the priority level to prevent the vulnerability from being maliciously exploited and affecting users.
What Terminology Will The Customer Understand?
For example, a home user will likely have less technical knowledge than points of contact at a large business Customers don’t need to understand special terminology, they can directly contact after-sales staff when they encounter problems.
How Much Information Will The Customer Need?
Customer can use the device normally according to manual, and that’s enough for customer. Manufacturer can also notify the user through the APP in some cases,such as firmware update notification. Customers just need general knowledge to understand all information.
How/Where Will The Information Be Provided?
Customer can acquire information through APP user manuals.
How Can The Integrity Of The Information Be Verified?
Customer purchase equipment through legal ways or download APP from the official website, the information will be secure.
Who Were The Expected Customers?
The device is not aimed at a specific type of user or a specific industry, the product is for normal consumers.
How Was The Device Intended To Be Used?
The devices are used to protect our assets and monitor the driving
conditions. Let’s see these two examples:
JC400 is the ideal companion for daily driving and long-distance travel. As a dual channel dash cam, it has a front camera to record what is happening on the road, and a detached cabin-facing camera that records every detail inside the car. As an integrated product, the JC400 Dual Channel Dash Cam features live tracking and video capture, G-sensor, emergency calls, and more, making it the perfect choice to deter crime, record bad motorists, and more quickly
resolve disputes resulting from traffic accidents.
JM-LL01 is an LTE asset tracker with ultra-long standby time. Depending on reporting frequency, its low consumption internal battery can provide up to 3 years of working time on a single charge. The JM-LL01's strong magnetic base allows for effortless installation onto any metal surface, and a light sensor will be triggered and an alert sent once detachment occurs, helping users to feel totally assured that their assets are under constant protection.
What Types Of Environments Would The Device Be Used In?
The device is mainly use inside the car.
How Would Responsibilities Be Shared Among The Manufacturer, The Customer, And Others?
Responsibilities should be shared among the manufacturer, the customer, and others according to terms of service. The manufacturer is responsible for the quality of device and the continuity and effectiveness of platform services. The customers should use the device and platform correctly.
How Long Do You Intend To Support The Device?
You can choose our products with no worries, as we provide a 13-month warranty for all tracking and DVR devices. If you choose to bind your devices with our platform Tracksolid/Tracksolid Pro, the warranty period extends to 24 months. Users can choose to upgrade their app if a newer version is available and get firmware upgrade services for free. Our app upgrades at least once every 2 weeks and the firmware for our products on sale upgrade at least once every 3 months. You can choose to subscribe to access all functions of our platform (app/web) and get better services.
When Do You Intend For Device End-Of-Life To Occur? What Will The End-Of-Life Process Be?
Usually the devices can work for 3 years. It also depends on the working environment. If the device is unavailable, you can contact Jimi for help. Our engineers will diagnose and repair it. They will tell you the product life cycle situation. When the old model is out of service, Jimi will inform users of the information through APP before discontinuing support.
What Functionality, If Any, Will The Device Have After Support Ends And At End-Of-Life?
Customer will be able to continue use of a device at its end-of-life, but it is possible that customer cannot control the device through the APP any longer.
How Can Customers Report Suspected Problems With Cybersecurity Implications, Such As Software Vulnerabilities, To The Manufacturer? Will Reports Be Accepted After Support Ends? Will Reports Be Accepted After End-Of-Life?
Customers can report problems on Jimi website (https://www.Jimilab.com/security/), or communicate with sales managers. All reports will be accepted even after support ends or end-of-life.
How Can Customers Maintain Security Even After Official Support For The Device Has Ended? Will Essential Files Or Data Be Made Available In A Public Forum To Allow Others, Even The Customers Themselves, To Continue To Support The IoT Device?
Manufacturers will inform users of the information through APP before discontinuing support.
What Information Do Customers Need On General Cybersecurity-Related Aspects Of The Device, Including Device Installation, Configuration (Including Hardening), Usage, Management, Maintenance, And Disposal?
The user can use it normally after connecting the device to the network according to the operation manual, other operations are not required. All of the user’s actions are considered by the vendor and are taken into account at the beginning of the system’s design.
What Is The Potential Effect On The Device If The Cybersecurity Configuration Is Made More Restrictive Than The Secure Default?
There is no need to change the network security-related configuration in use.
What Inventory-Related Information Do Customers Need For The Device’s Internal Software And Firmware, Such As Versions, Patch Status, And Known Vulnerabilities? Do Customers Need To Be Able To Access The Current Inventory On Demand?
Users can check known security risks through Jimi IoT security site https://www.Jimilab.com/security/ Users can view other device relate information through APP.
What Information Do Customers Need About The Sources Of The Device’s Software, Firmware, Hardware, And Services?
The user does not need to pay attention to the software and hardware used by the specific device, cloud service platform and other information during use.
What Information Do Customers Need On The Device’s Operational Characteristics So They Can Adequately Secure The Device? How Should This Information Be Made Available?
There isn’t multiple firmware for this product. The user does not need to pay attention to the software and hardware used by the specific device, cloud service platform and other information during use.
What Functions Can The Device Perform?
Jimi IoT supplies a full range of GNSS tracking devices, including hardwired GPS tracker/wireless GPS tracker, 2G/3G/4G GPS tracker, basic/versatile tracker. By leveraging GPS tracking devices, you can protect and fully utilize your trailer, truck, tractor, construction fleet, and equipment, etc.Car DVRs are the ideal companions for daily
driving and long-distance travel, as they can record what is happening on the road and every detail inside the car. Dash Cam features live tracking and video capture, G-sensor, emergency calls, and more, making it the perfect choice to deter crime, record bad motorists, and more quickly resolve disputes resulting from traffic accidents.
What Data Types Can The Device Collect? What Are The Identities Of All Parties (Including The Manufacturer) That Can Access That Data?
Description |
Name of the collected data |
Detail content of the data |
DUT or companion Midea APP or Tracksolid APP or cloud or third party that collected,stored and accessed the data |
||
collector |
storer |
accessor |
|||
Data 1 |
Email address Nickname Profile photo Account login password |
To verified user’s identity |
APP |
Cloud & APP | Cloud & APP |
Data 2 | Schedule | To start device regularly | APP | Cloud &APP | Cloud &APP |
Data 3 | IP address | To help track and fix any fault; or error in the application |
APP | Cloud &APP | Cloud &APP |
Data 4 |
Wi-Fi SSID Wi-Fi password |
For network communication | Device | Device | Device |
Data 5 | Wi-Fi firmware version | For firmware update | APP | Cloud &APP | Cloud &APP |
What Are The Identities Of All Parties (Including The Manufacturer) Who Have Access To Or Any Degree Of Control Over The Device?
Users and device manufacturers have access to or any degree of control over the device.
Will Updates Be Made Available? If So, When Will They Be Released?
The Redstone upgrade application is built into the device. When the
device is powered on, the upgrade program will run automatically after the device is restarted, and actively initiate a request to access the Redstone server to detect whether there is an upgrade task.
• If there is an upgrade task, it will download the firmware upgrade package.
• After the firmware upgrade package is downloaded, the program will first check the integrity of the upgrade package. If the firmware version integrity check is successful, it will notify the system to perform the upgrade.
• When the system receives the notification of the upgrade action, it will verify the system signature of the upgrade package. After the system signature verification is successful, it will execute the upgrade action.
Under What Circumstances Will Updates Be Issued?
The Jimi product team will release new firmware on Jimi cloud platform when vulnerabilities are found, or functions can be optimized.
How Will Updates Be Made Available Or Delivered? Will There Be Notifications When Updates Are Available Or Applied?
The Redstone upgrade application is built into the device. When the
device is powered on, the upgrade program will run automatically after the device is restarted, and actively initiate a request to access the Redstone server to detect whether there is an upgrade task.
• If there is an upgrade task, it will download the firmware upgrade package.
• After the firmware upgrade package is downloaded, the program will first check the integrity of the upgrade package. If the firmware version integrity check is successful, it will notify the system to perform the upgrade.
• When the system receives the notification of the upgrade action, it will verify the system signature of the upgrade package. After the system signature verification is successful, it will execute the upgrade action.
Which Entity (E.G., Customer, Manufacturer, Third Party) Is Responsible For Performing Updates? Or Can The Customer Designate Which Entity Will Be Responsible?
Manufacturer is responsible for performing updates. The customer can’t designate which entity will be responsible for performing updates, the update will be automatically applied by the manufacturer.
How Can Customers Verify And Authenticate Updates?
Customer does not need to verify firmware as this is performed by device.
What Information Should Be Communicated With Each Individual Update?
Users can get software update information through APP. E.g., Product function iteration, Performance efficiency update, bug repair, etc
Will Customers Want To Transfer Ownership Of Their Devices To Another Party?
If so, what do customers need to do so their user and configuration data on the device and associated systems (e.g. cloud-based services used by the device) are not accessible by the party who assumes ownership? The user can restore the device to the factory settings according to the device operation manual. And then, the user data will be cleared, and third-party users can use the device.
Will Customers Want To Render Their Devices Inoperable? If So, How Can Customers Do That?
After the user terminates the binding of the device through the APP, the device will no longer be controlled remotely (unless re-binding). The user can restore the device to factory settings by deleting the account and device in the APP or services backend.
Which Non-Technical Means Can Be Provided By The Manufacturer Or Other Organizations And Services Acting On Behalf Of The Manufacturer?
When remotely controlling the device, consumer need to connect to the cloud service platform provided by the manufacturer through a wireless network.
- Jimi provides IoT Security Emergency Response Centre for receiving and handling security issues.
- The manufacturer provides firmware update support during the device support period.
- Provide Jimi online service if user meet any problem during the device support period.
Which Technical Or Non-Technical Means Should The Customer Provide Themselves Or Consider Providing Themselves?
The user only needs to configure the network normally according to equipment operation manual, without installing additional software or hardware supporting equipment, such as firewall.
How Is Each Of The Technical And Non-Technical Means Expected To Affect Cybersecurity Risk?
For example, proper implementation of data protection may help mitigate confidentiality risks, but may also reduce availability (e.g., if data cannot be decrypted or is decrypted slowly), which could increase availability risks. Technical means such as cryptographic algorithms/ authentication mechanisms are used to protect data confidentiality and authorization. These technical means are able to prevent most common cybersecurity attacks. Non-technical means such as security response centre, JIMI maintaining services are used to keep availability of device.