Users and device manufacturers have access to or any degree of control over the device.
FAQ
The Redstone upgrade application is built into the device. When the device is powered on, the upgrade program will run automatically after the device is restarted, and actively initiate a request to access the Redstone server to detect whether there is an upgrade task. • If there is an upgrade task, it will download the firmware upgrade package. • After the firmware upgrade package is downloaded, the program will first check the integrity of the upgrade package. If the firmware version integrity check is successful, it will notify the system to perform the upgrade. • When the system receives the
The Jimi product team will release new firmware on Jimi cloud platform when vulnerabilities are found, or functions can be optimized.
The Redstone upgrade application is built into the device. When the device is powered on, the upgrade program will run automatically after the device is restarted, and actively initiate a request to access the Redstone server to detect whether there is an upgrade task. • If there is an upgrade task, it will download the firmware upgrade package. • After the firmware upgrade package is downloaded, the program will first check the integrity of the upgrade package. If the firmware version integrity check is successful, it will notify the system to perform the upgrade. • When the system receives the
Manufacturer is responsible for performing updates. The customer can’t designate which entity will be responsible for performing updates, the update will be automatically applied by the manufacturer.
Customer does not need to verify firmware as this is performed by device.
Users can get software update information through APP. E.g., Product function iteration, Performance efficiency update, bug repair, etc
If so, what do customers need to do so their user and configuration data on the device and associated systems (e.g. cloud-based services used by the device) are not accessible by the party who assumes ownership? The user can restore the device to the factory settings according to the device operation manual. And then, the user data will be cleared, and third-party users can use the device.
After the user terminates the binding of the device through the APP, the device will no longer be controlled remotely (unless re-binding). The user can restore the device to factory settings by deleting the account and device in the APP or services backend.
When remotely controlling the device, consumer need to connect to the cloud service platform provided by the manufacturer through a wireless network. 1、Jimi provides IoT Security Emergency Response Centre for receiving and handling security issues. 2、The manufacturer provides firmware update support during the device support period. 3、Provide Jimi online service if user meet any problem during the device support period.