How do you protect the configuration from unauthorized modification?

How do you protect the configuration from unauthorized modification?

2022-06-01

The
debug interface has been closed, and unauthorized users cannot access it, and
Wi-Fi and BLE interface can’t be access without authorization.

1.Physical
protection: There isn’t any external interfaces on device that allows reading /
writing firmware data or configuration data.

2.Network
connection protection: There is authentication mechanisms sitting in both
cloud, application and device to prevent any malicious/unauthenticated
connections.

SHARE
Open chat
Hello, Welcome to JimiIOT

The real-time manual customer service time range is 01:00~11:00 (UTC-0), please leave your question here and it will be handled promptly on the next working day.

Can we help you?