FAQ / NISTIR 8259 FAQ / How is IoT device code protected from unauthorized access and tampering?

How is IoT device code protected from unauthorized access and tampering?

How is IoT device code protected from unauthorized access and tampering?

2022-06-01

The
source code is compiled and burned to the device; source code is not involved
during the use of the device. The debug interface has been closed, and the unauthorized
users cannot access it.

Jimi developers use Git to
control source code of the device, and it implement session control, access
control, all these functions can protect device code from unauthorized access
and tampering.

SHARE
Open chat
Hello, Welcome to JimiIOT
Can we help you?