What is the degree of trust in the IoT device that customers may need?


Privacy Policy

Communication protocols follow the principles of
confidentiality, integrity and availability. There is an authentication
mechanism for communication between device and APP, device and cloud, and cloud
and APP. The session key is obtained through TLS1.2 handshake. TLS 1.2 is used
for integrity verification during data transmission. And local data is stored
in encryption, such as the account and password of AP is encrypted with Root
Key, which is derived from the IMEI of the chip hardware.

general, Jimi uses strong secure cryptographic algorithms and secure protocol
to protect all the traffic between device and cloud, device and application.

Related post