HUD (Head Up Display) is a Display system that avoids safety hazards caused by drivers' lowering their heads and diverting their eyes by displaying important driving information on the front windshield in real time. With the maturity of HUD technology and the expansion of market demand, the future vehicle-mounted HUD head-up display market will have a great development.
"HUD Industry Report" (2020 version) was recently released by Gongan Automotive Research Institute. The report first introduces the HUD development background, vehicle-mounted HUD industrial chain, panorama and the upgrading path of vehicle-mounted HUD. Secondly, HUD's working principle, hardware structure and projection technology classification, content display and layout, current development bottleneck and future development trend are respectively introduced centering on technology. Finally, focusing on the market, the paper introduces and analyzes the global market competition pattern, market share and forecast, the supporting conditions of the front installation market and the supporting conditions of suppliers.
Outline of the report
1. Summary of HUD
2. On-board HUD technology
3. On-board HUD market
Introduction to the
"New energy vehicles industry development planning (2021-2035)," pointed out that the thought of socialism with Chinese characteristics to jinping new era as the guidance, adhere to the concept of the new development, to deepen the reform of the supply side structural as the main line, insist on electric, snatched and intelligent development direction, with emphasis on the integration innovation, break through the key core technology, optimize the environment of industrial development, the sustainable development of China's new energy automotive industry quality, speed up the construction of automobile power.
Charged with Ann automobile research institute will regularly publish the insight: the auto industry a new three monthly reports, stick to the car "new order", for the month of important industry news in-depth analysis, and is equipped with market sector, the main analysis monthly market sales, new energy automobile new models listed summary, focus on new vehicle intelligent snatched carry, etc., for the automotive industry to provide professional information reading and consulting services.
3. Network connection
Iv. Analysis of new products of new energy vehicles
5. Application analysis of intelligent network technology
Business Object：It is applicable to the automotive industry safety related electrical and electronic system research and development units of the research and development of the third party product evaluation; It is suitable for automobile manufacturers to conduct quality evaluation on automobile electronic safety related system, standardize product development process, and improve product safety and quality level; It is also applicable to the functional safety evaluation of the automatic vehicle auxiliary control system.
According to standards：ISO 26262-6:2018 and GB/T 34590.6-2017
Business Object：Third party evaluation of the control and protection system of the communication, signal and processing system required by the CRC management department; It is also suitable for the CRC product development unit to test the product's functional safety, standardize the product development process and improve the product quality.
According to standards：ISO EN50128-2011
Business Object：The standard applies to one or more systems consisting of electrical/electronic/programmable electronic safety devices, and performs functional testing, system development, validation and evaluation, as well as software development, testing and validation to the system product developer as required by the standard.
According to standards：IEC 61508-3:2010
Electrical/electronic/programmable electronic security system functional safety test
Business Object：Applicable to verify that the software developed by the user performs the software functions specified in the requirements specification. The evaluation results can be used for the user's acceptance of the developer and the developer's product promotion.
Test Standards：GB/T 25000.51-2016
1）Document compliance review
2）Software validation test
3）The performance test The performance indexes of the system under the specified resource allocation are tested, such as maximum traffic and page view, shortest response time, longest response time, transaction processing rate, etc.
The vehicle-based Ethernet test system, developed by Shanghai Control Security, apply for each ethernet OSI layer standard test for automotive OEM manufactures and ECU part suppliers, using international high-quality equipment manufacturer part, providing one-stop testing services for customers.
The system could provide standardized testing, test cases, simulation testing and automated testing to meet customer’s requirements, to service customers with a full range of qualified Ethernet testing services.
According to the information security evaluation system and the specific needs of customers, the security applications and functions adopted by customers are verified to ensure that the security applications in the tested objects can play their functions normally, and the vulnerabilities or logic hidden dangers in the security functions can be found.
By simulating the techniques and methods of malicious attackers, the security control measures of the target system are frustrated, corresponding information and permissions are obtained, and a security test and evaluation method with hidden security risks of business impact consequences is found.
Through information collection, threat modeling, threat analysis, scheme formulation, test execution, test report and other main processes, complete the overall security assessment of the tested object.
To build compliance testing capabilities for all types of standards issued by the CAAC.
At present, safety test system and scheme construction have been carried out for the following safety-related standards to help customers better cope with the compliance test that has come or will come:
Shanghai Lingang Power Electronics Research Institute and TICPSH jointly set up a power semiconductor testing and verification platform, which will fill the gap of an integrated semiconductor device testing platform that is both open and advanced. It serves the whole industry chain of power semiconductor chips, power modules, parts suppliers and complete machine factories from Shanghai to the whole country, and speeds up the promotion and industrial application of domestically developed power semiconductor chips and power modules.
The service content of the power semiconductor test and Verification platform covers chip level, module level and application level testing, including:
At present, the largest three-dimensional garage in China has been built in Chongming to alleviate the parking problem in Chongming Branch of Xinhua Hospital. The parking garage is 35 meters high, with 12 tower garages, 6 exits from north and south, divided into 17 parking floors and 408 parking Spaces, covering an average area of 1.5 square meters for each parking space. Project related personnel introduced that the average parking time of normal vehicles is about 1 minute. When the whole project is completed, it will increase to about 1200, which will greatly solve the problem of parking for people seeking medical treatment. In addition, the intelligent parking garage will also build a certain number of charging pile equipment to encourage people on the island to travel on new energy vehicles and promote the construction of Chongming Ecological Island. This project has been approved by Shanghai Municipal Science and Technology Commission 2016 Innovation Fund.
It supports the access of business intelligence and open source intelligence, and integrates some selected open source intelligence sources for users to choose, enriching the threat intelligence data of users. At the same time, unified management and automatic intelligence update of multiple threat intelligence sources can be realized, and users can also monitor the running status of threat intelligence in real time through the platform.
Automatic aggregation of threat intelligence can be realized according to predefined rules. It effectively processes and correlates intelligence from commercial, open source, and internally generated intelligence to produce high-quality, usable threat intelligence information. The platform also supports user-defined intelligence aggregation capabilities.
It can effectively integrate with security equipment and management platform in user network, and provide API interface for integration to connect with intelligence consumption equipment, so as to realize automatic acquisition and use of intelligence.
The internal Shared intelligence can be aggregated and used by other users and security devices to help users truly establish a closed loop of threat intelligence utilization, and form personalized threat intelligence with internal environment background information to cope with the emerging attacks.
To set up the water utilities digital twin simulation verification environment, the process flow and system engineering operation and management process of water utilities system are simulated and modeled from the perspective of digital twin application, so as to realize the structural division of the operation and management process. Digital twin research and design are carried out for different levels and types of water system business, and the functions to be realized by each digital twin and the corresponding processing flow are clarified. The digital twin technology is used to realize the simulation modeling of key information facilities of water utilities, realize the digital twin data description and visual display form of typical process links such as sewage, and display the operation situation and overall situation of typical processes of water utilities in a comprehensive, accurate, three-dimensional and real-time manner.
Water safety risk analysis module for control in the raw water, water system, water supply, drainage, sewage, etc. The typical process flow, in view of the water industry commonly used industrial control equipment (including gas generator, motor, valve, instruments and meters, industrial control, engineer station and configuration software, etc.), simulation verification equipment safety control in the weak points and risk, safety protection measures and the safety of the process efficiency, authentication security protection technology with the defense capabilities of the product.
Water security defense exercise module, combined with industrial control system of the asset identification, threat identification, asset vulnerability analysis and the evaluation of the existing safety management measures, etc., to track and study a typical industrial control system security events, combing industry industrial control system of the main security threat and commonly used means of attack, in the test environment real reduction system environment and manner of the hacker's attack, for the user to carry on the practice, the understanding of the principle of methods and techniques of attack.
ISO26262 standard training and case interpretation
Safety analysis training -FEMDA/FTA/FMEA
Functional safety assessment document guidance
Medini Software application guide
SCADE model construction and validation
Vehicle level safety analysis and evaluation
ECU level security analysis and evaluation
ASPICE system Consulting
26262 Evaluation process consultation
Product function development (safety related) consultation
Round of testing
Complete vehicle/component fire test
Material toxicity test
General purpose product of signal system
Signal system specific applications
Intelligent track inspection
Monitored by pantograph characterization
Operation and maintenance RAMS system
CENELEC EN5012X series standard interpretation
System modeling and formal validation services
Automated test service
Airborne System Development and Certification (ARP4754A/4761)
Aircraft/System level safety Assessment (FHA/PSSA/SSA/CCA)
Reliability design and analysis
Reliability test and verification
FRACAS system and continuous improvement
Environmental Appraisal Test (DO-160g)
Development and Approval of airborne Electronic hardware and Software (DO-254/178B/C)
Tool identification, model-based development and validation
ARINC 661, Cockpit Display System and User System Interface Standard (ANSYS SCADE)
SCADE engineering applications
IEC 62443, ISO 15408 and other information security standards training and case interpretation
System threat modeling--Treat Modelling
Industrial control system safety requirements training
Industrial control system safety risk assessment training
Risk assessment and management of industrial control systems
Third party information security management of industrial control system
Industrial information security development and testing consulting
IEC 62443 management system development, certification, consulting
ISASecure-SDLA development system consulting
ISASecure-SSA, ISASecure-CSA system information security consulting
Safety level analysis and evaluation
Industrial control system product safety analysis, evaluation and certification
Embedded system evaluation and certification
• Host system evaluation and certification
Evaluation and certification of industrial network equipment
Information security Basic security requirements testing
Information security standards compliance testing
Information security robustness tests
ISO/SAE 21434 Interpretation, testing and consultation
Intelligent network vehicle risk assessment
Intelligent network vehicle safety test
Development and requirement of information security of intelligent charging pile
Communication compliance testing, construction and consultation
Communication security compliance testing, construction and consultation
Overseas market information security access compliance consulting
The training is divided into three levels: Primary, middle and high. The students will attend the examination (examination) organized by the education and training center of the ministry of human resources and social security. After passing the examination, the students will be awarded the training certificate of the education and training center of the ministry of human resources and social security. A total of 42 class hours of industrial control information security training, including 30 class hours of network training and 12 class hours of face-to-face training, the total registration fee is 3000 rmb.
1、Physical layer test
2、Protocol layer testing
3、Transport layer protocol
4、Application layer protocol
5、Switch performance test
TICPSH, as one of the member units of automobile information safety standards Group, closely follows current events and the trend of standards, closely promotes the in-depth and expansion of compliance testing capabilities, establishes information safety testing system, and improves the quality of safety testing services.
CCTV Financial channel reports:
The collision between threat intelligence and local security logs is realized by collecting syslog logs. The access update of multi-source threat intelligence changes the disadvantage that single threat intelligence cannot be used by multiple devices and reduces the resource input; At the same time, it provides API interface, security equipment and security management platform for rapid integration, which reduces the development workload of users during the landing process of threat intelligence.
The functions of intelligence management and intelligence aggregation can simplify the workload of user threat intelligence management and update, ensure real-time update and rapid aggregation of intelligence, and greatly improve the level of user threat intelligence management and application.
To change the disadvantages of single intelligence consumption, establish a complete intelligence utilization loop in the user's local area, so that the user's local terminal and equipment are both consumers and producers of threat intelligence, and promote the improvement of threat intelligence quality.
By integrating threat intelligence, the capability of the original security equipment can be effectively improved to deal with unknown threats and APT attacks. Rich contextual information of threat intelligence can be utilized to help users effectively understand threats and reduce the difficulty of security problem disposal.
The log information of the original security equipment and solutions is integrated and stored in the threat intelligence platform through normalized processing, which is used for correlation analysis and collision with the aggregated threat intelligence to provide users with the security early warning function based on threat intelligence.
The digital twin technology is used to realize the simulation modeling of key information facilities of water utilities, realize the digital twin data description and visual display form of typical process links such as sewage, and display the operation situation and security situation of typical processes of water utilities in a comprehensive, accurate, three-dimensional and real-time manner.
The vulnerability scanning and vulnerability mining of typical and mainstream industrial control equipment of water utilities are realized, and the security vulnerability and attack possibility of current mainstream network topology are evaluated. To realize the safety risk assessment of typical process flow and the improvement of safety reinforcement capacity.
By deploying honeypot and attack and defense shooting range of water industry, active trapping of attack behavior, analysis modeling of typical attack behavior and attack and defense drill are realized. Combined with the technical requirements of security plan of water business system, the emergency handling capability under the scene of emergent security incident is realized.
Based on the simulation verification environment, the safety technical requirements, safety management requirements and the actual business environment are effectively combined to establish the skills training and practical training ability of safety professional technical personnel for the water industry.
TICPSH Functional Safety Research Institute gathers a group of experts from well-known enterprises and universities at home and abroad, and keeps itself in the forefront of industry technology through active cooperation with major companies worldwide. With the technical strength of the team and rich industry experience, the team can provide international level functional safety guidance and consultation for many national strategic key systems, and can provide full life cycle solutions and technical cases from the system structure design, development process system, to the final system test integration link.
The team brings together a group of security experts of industrial control system, and establishes close cooperation with numerous information security laboratories at home and abroad, which can provide full life cycle information security consulting services for the national key industrial infrastructure industry.
This laboratory focuses on the research of embedded vehicle-mounted system information security penetration, abnormal intrusion detection, vehicle controller safety reinforcement, expected function safety verification and other technologies. We welcome the academic community and the industry to carry out technical cooperation and exchange and joint technical research, so as to provide effective technical support for enhancing the information security of vehicle-mounted embedded systems.
Support ten million connections and concurrent ten thousand peak loads.
The service availability reaches 99% above, has the complete downtime response mechanism.
It supports the real-time display of the total number of intelligent terminals, the total number of online terminals, the number of offline terminals and the number of alarms. Supports display by region.
Support security monitoring and audit for NB-IOT, Macbee, WiFi, Zigbee, Lora and other intelligent terminals of internet of things.
Support multiple ways to display the number of online and offline intelligent terminals in real time, support classified statistics, support display by region.