FAQ / NISTIR 8259 FAQ / How will the IoT device need to be accessed, managed, and monitored by authorized people, processes, and other devices?

How will the IoT device need to be accessed, managed, and monitored by authorized people, processes, and other devices?

How will the IoT device need to be accessed, managed, and monitored by authorized people, processes, and other devices?

2022-06-01

Besidescontrollingdevicephysically,onlydevice’sownercanremotelycontrolthedeviceviaTracksolid PROapplication. There is an authentication mechanism in
application to prevent unauthorized user to control device. All remote
communications are protected using cryptographic methods to ensure only
device’s owner has the permission forcontrolling.
Only customers can control the device, manufacturer can manage the running
status of the device and provide upgrades.

SHARE
Open chat
Hello, Welcome to JimiIOT
Can we help you?