Service

Service overview

Service Items

HUD Industry Report (2020 edition)

HUD (Head Up Display) is a Display system that avoids safety hazards caused by drivers' lowering their heads and diverting their eyes by displaying important driving information on the front windshield in real time. With the maturity of HUD technology and the expansion of market demand, the future vehicle-mounted HUD head-up display market will have a great development.


"HUD Industry Report" (2020 version) was recently released by Gongan Automotive Research Institute. The report first introduces the HUD development background, vehicle-mounted HUD industrial chain, panorama and the upgrading path of vehicle-mounted HUD. Secondly, HUD's working principle, hardware structure and projection technology classification, content display and layout, current development bottleneck and future development trend are respectively introduced centering on technology. Finally, focusing on the market, the paper introduces and analyzes the global market competition pattern, market share and forecast, the supporting conditions of the front installation market and the supporting conditions of suppliers.


Outline of the report


1. Summary of HUD


2. On-board HUD technology


3. On-board HUD market

"Insight into the New Three Aspects of the Auto Industry" (November)

Introduction to the

"New energy vehicles industry development planning (2021-2035)," pointed out that the thought of socialism with Chinese characteristics to jinping new era as the guidance, adhere to the concept of the new development, to deepen the reform of the supply side structural as the main line, insist on electric, snatched and intelligent development direction, with emphasis on the integration innovation, break through the key core technology, optimize the environment of industrial development, the sustainable development of China's new energy automotive industry quality, speed up the construction of automobile power.


Charged with Ann automobile research institute will regularly publish the insight: the auto industry a new three monthly reports, stick to the car "new order", for the month of important industry news in-depth analysis, and is equipped with market sector, the main analysis monthly market sales, new energy automobile new models listed summary, focus on new vehicle intelligent snatched carry, etc., for the automotive industry to provide professional information reading and consulting services.


directory

First, electric


Ii. Intelligentization


3. Network connection


Iv. Analysis of new products of new energy vehicles


5. Application analysis of intelligent network technology

The state of door locks is monitored by big data statistics, and the distribution market of door locks is shown by map
The risk status of door locks is analyzed and predicted by big data, and the risk data is used to alert with bright colors
Real-time feedback of intelligent lock status information
Smart door locks with decentralized control
Manage security vulnerabilities in smart door locks
Study and predict the risk of smart door locks
Functional safety testing and evaluation of automobile, rail transit and industrial control systems

Function safety evaluation of embedded software of automobile electronic products

Business Object:It is applicable to the automotive industry safety related electrical and electronic system research and development units of the research and development of the third party product evaluation; It is suitable for automobile manufacturers to conduct quality evaluation on automobile electronic safety related system, standardize product development process, and improve product safety and quality level; It is also applicable to the functional safety evaluation of the automatic vehicle auxiliary control system.

According to standards:ISO 26262-6:2018 and GB/T 34590.6-2017

Business types:

  • Code review
  • Unit testing
  • Integration testing
  • Embedded software testing
  • Functional testing

Function safety evaluation of embedded software of rail transit electronic products


Business Object:Third party evaluation of the control and protection system of the communication, signal and processing system required by the CRC management department; It is also suitable for the CRC product development unit to test the product's functional safety, standardize the product development process and improve the product quality.

According to standards:ISO EN50128-2011

Business types:

  • Code review
  • Unit testing
  • Integration testing
  • Software and hardware integration test
  • Overall software testing/validation
  • Functional testing

Functional safety evaluation of electrical/electronic/programmable electronic safety related system product software

Business Object:The standard applies to one or more systems consisting of electrical/electronic/programmable electronic safety devices, and performs functional testing, system development, validation and evaluation, as well as software development, testing and validation to the system product developer as required by the standard.

According to standards:IEC 61508-3:2010

Business types:
Electrical/electronic/programmable electronic security system functional safety test

  • Document review
  • Code review
  • Unit testing
  • Integration testing
  • The system test
  • Functional testing

General purpose software product testing

Business Object:Applicable to verify that the software developed by the user performs the software functions specified in the requirements specification. The evaluation results can be used for the user's acceptance of the developer and the developer's product promotion.

Test Standards:GB/T 25000.51-2016

Business types:
1)Document compliance review
2)Software validation test

  • Functional testing
  • Reliability test
  • Compatibility test
  • Usability testing
  • Information security
  • Maintenance security
  • Portability testing

3)The performance test The performance indexes of the system under the specified resource allocation are tested, such as maximum traffic and page view, shortest response time, longest response time, transaction processing rate, etc.


The business overview

The vehicle-based Ethernet test system, developed by Shanghai Control Security, apply for each ethernet OSI layer standard test for automotive OEM manufactures and ECU part suppliers, using international high-quality equipment manufacturer part, providing one-stop testing services for customers.

 

Test Standards
  • OPEN TC8
  • IEEE 802.3bw-2015
  • RFC 2544
  • RFC 2889
  • AUTOSAR
  • ISO 13400-2:2012
Business Types

The system could provide standardized testing, test cases, simulation testing and automated testing to meet customer’s requirements, to service customers with a full range of qualified Ethernet testing services.

Security functional verification tests

According to the information security evaluation system and the specific needs of customers, the security applications and functions adopted by customers are verified to ensure that the security applications in the tested objects can play their functions normally, and the vulnerabilities or logic hidden dangers in the security functions can be found.

Information security penetration test

By simulating the techniques and methods of malicious attackers, the security control measures of the target system are frustrated, corresponding information and permissions are obtained, and a security test and evaluation method with hidden security risks of business impact consequences is found.

Through information collection, threat modeling, threat analysis, scheme formulation, test execution, test report and other main processes, complete the overall security assessment of the tested object.

Compliance testing

To build compliance testing capabilities for all types of standards issued by the CAAC.

At present, safety test system and scheme construction have been carried out for the following safety-related standards to help customers better cope with the compliance test that has come or will come:

The Information Security section of Appendix Q in GB 17691-2018 Pollutant emission Limits and Measurement Methods for Heavy-duty Diesel Vehicles (China Stage 6)
20191069-T-339 Technical Requirements for Information Security of Vehicle-Mounted Information Interactive System
20191066-T-339 Technical Requirements for Information Security of Electric Vehicle Remote Information Service and Management System

Power semiconductor device test and verification platform

Shanghai Lingang Power Electronics Research Institute and TICPSH jointly set up a power semiconductor testing and verification platform, which will fill the gap of an integrated semiconductor device testing platform that is both open and advanced. It serves the whole industry chain of power semiconductor chips, power modules, parts suppliers and complete machine factories from Shanghai to the whole country, and speeds up the promotion and industrial application of domestically developed power semiconductor chips and power modules.

 

The service content of the power semiconductor test and Verification platform covers chip level, module level and application level testing, including:

  • Chip level test: Chip parameter comparison
  • Module performance testing: Application characteristic analysis
  • Module reliability test: life evaluation, failure analysis
  • Module integration test: virtual load test platform, power capability assessment, driver integration optimization
  • Application carrier: environmental adaptability test platform, durability test platform, design verification
Summary of service

At present, the largest three-dimensional garage in China has been built in Chongming to alleviate the parking problem in Chongming Branch of Xinhua Hospital. The parking garage is 35 meters high, with 12 tower garages, 6 exits from north and south, divided into 17 parking floors and 408 parking Spaces, covering an average area of 1.5 square meters for each parking space. Project related personnel introduced that the average parking time of normal vehicles is about 1 minute. When the whole project is completed, it will increase to about 1200, which will greatly solve the problem of parking for people seeking medical treatment. In addition, the intelligent parking garage will also build a certain number of charging pile equipment to encourage people on the island to travel on new energy vehicles and promote the construction of Chongming Ecological Island. This project has been approved by Shanghai Municipal Science and Technology Commission 2016 Innovation Fund.

Multi-source threat intelligence access management


It supports the access of business intelligence and open source intelligence, and integrates some selected open source intelligence sources for users to choose, enriching the threat intelligence data of users. At the same time, unified management and automatic intelligence update of multiple threat intelligence sources can be realized, and users can also monitor the running status of threat intelligence in real time through the platform.

 

Automatic aggregation of threat intelligence

Automatic aggregation of threat intelligence can be realized according to predefined rules. It effectively processes and correlates intelligence from commercial, open source, and internally generated intelligence to produce high-quality, usable threat intelligence information. The platform also supports user-defined intelligence aggregation capabilities.

Threat intelligence distribution

It can effectively integrate with security equipment and management platform in user network, and provide API interface for integration to connect with intelligence consumption equipment, so as to realize automatic acquisition and use of intelligence.

Threat intelligence sharing

The internal Shared intelligence can be aggregated and used by other users and security devices to help users truly establish a closed loop of threat intelligence utilization, and form personalized threat intelligence with internal environment background information to cope with the emerging attacks.

Water Digital twin simulation verification environment

To set up the water utilities digital twin simulation verification environment, the process flow and system engineering operation and management process of water utilities system are simulated and modeled from the perspective of digital twin application, so as to realize the structural division of the operation and management process. Digital twin research and design are carried out for different levels and types of water system business, and the functions to be realized by each digital twin and the corresponding processing flow are clarified. The digital twin technology is used to realize the simulation modeling of key information facilities of water utilities, realize the digital twin data description and visual display form of typical process links such as sewage, and display the operation situation and overall situation of typical processes of water utilities in a comprehensive, accurate, three-dimensional and real-time manner.

Risk analysis module of industrial control safety of water utilities

Water safety risk analysis module for control in the raw water, water system, water supply, drainage, sewage, etc. The typical process flow, in view of the water industry commonly used industrial control equipment (including gas generator, motor, valve, instruments and meters, industrial control, engineer station and configuration software, etc.), simulation verification equipment safety control in the weak points and risk, safety protection measures and the safety of the process efficiency, authentication security protection technology with the defense capabilities of the product.

Water security attack and defense drill module

Water security defense exercise module, combined with industrial control system of the asset identification, threat identification, asset vulnerability analysis and the evaluation of the existing safety management measures, etc., to track and study a typical industrial control system security events, combing industry industrial control system of the main security threat and commonly used means of attack, in the test environment real reduction system environment and manner of the hacker's attack, for the user to carry on the practice, the understanding of the principle of methods and techniques of attack.

Automotive electronics industry service capabilities
  • Training services

     ISO26262 standard training and case interpretation
     Safety analysis training -FEMDA/FTA/FMEA
     Functional safety assessment document guidance
     Medini Software application guide
    SCADE model construction and validation

  • products

     Vehicle level safety analysis and evaluation
     ECU level security analysis and evaluation
     Product certification

  • Consulting services

     ASPICE system Consulting
     26262 Evaluation process consultation
     Product function development (safety related) consultation

Service capacity of rail transit industry
  • test experiment

     Round of testing
     Complete vehicle/component fire test
     Material toxicity test

  • The safety assessment

     General purpose product of signal system
     Signal system specific applications

  • Intelligence operations

     Intelligent track inspection
     Monitored by pantograph characterization
     Operation and maintenance RAMS system

  • Security activities

     CENELEC EN5012X series standard interpretation
     System modeling and formal validation services
     Automated test service

Aviation industry service capability
  • security

     Airborne System Development and Certification (ARP4754A/4761)
     Aircraft/System level safety Assessment (FHA/PSSA/SSA/CCA)

  • reliability

     Reliability design and analysis
     Reliability test and verification
     FRACAS system and continuous improvement

  • Environmental test

     Environmental Appraisal Test (DO-160g)

  • Hardware and software design

     Development and Approval of airborne Electronic hardware and Software (DO-254/178B/C)
     Tool identification, model-based development and validation
     ARINC 661, Cockpit Display System and User System Interface Standard (ANSYS SCADE)

  • Development engineering

     ARCADIA's methodology
     SCADE engineering applications

Industrial control system
  • Training services

    IEC 62443, ISO 15408 and other information security standards training and case interpretation
    System threat modeling--Treat Modelling
    Industrial control system safety requirements training
    Industrial control system safety risk assessment training

  • Consulting services

    Risk assessment and management of industrial control systems
    Third party information security management of industrial control system
    Industrial information security development and testing consulting
    IEC 62443 management system development, certification, consulting
    ISASecure-SDLA development system consulting
    ISASecure-SSA, ISASecure-CSA system information security consulting

  • Assessment services

    Safety level analysis and evaluation
    Industrial control system product safety analysis, evaluation and certification
    Embedded system evaluation and certification
    • Host system evaluation and certification
    Evaluation and certification of industrial network equipment

  • Testing services

    Information security Basic security requirements testing
    Information security standards compliance testing
    Information security robustness tests

Automobile industry service ability
  • Training services

    ISO/SAE 21434 Interpretation, testing and consultation
    Intelligent network vehicle risk assessment
    Intelligent network vehicle safety test
    Development and requirement of information security of intelligent charging pile

  • Consulting services

    Communication compliance testing, construction and consultation
    Communication security compliance testing, construction and consultation
    Overseas market information security access compliance consulting

Is Internet of Vehicles the biggest market for 5G? First understand what the Internet of cars is!


Typical applications

The training is divided into three levels: Primary, middle and high. The students will attend the examination (examination) organized by the education and training center of the ministry of human resources and social security. After passing the examination, the students will be awarded the training certificate of the education and training center of the ministry of human resources and social security. A total of 42 class hours of industrial control information security training, including 30 class hours of network training and 12 class hours of face-to-face training, the total registration fee is 3000 rmb.

Miao Weikai
Guo Jian
Zhao Xin
Liu Chunxiao
Dong Hao
Zhao Hui
Pu Goguang
Gerhard M.Rieger
Timely warning of the risks of smart door locks



Personnel training

School-enterprise cooperation

Certification certificate

partners

1、Physical layer test

  • PMA test
  • IOP test

2、Protocol layer testing

  • ICMPv4/ V6 protocol function/conformance test
  • ARP protocol function/conformance test

3、Transport layer protocol

  • TCP protocol function/Conformance test
  • UDP protocol function/Conformance test
  • AVB Protocol testing

4、Application layer protocol

  • SOME/IP protocol function/Conformance test
  • AUTOSAR UDPNM protocol function/Conformance test
  • DoIP protocol function/Conformance test

5、Switch performance test

6、Equipment leasing

Service advantages

TICPSH, as one of the member units of automobile information safety standards Group, closely follows current events and the trend of standards, closely promotes the in-depth and expansion of compliance testing capabilities, establishes information safety testing system, and improves the quality of safety testing services.

Media reports

CCTV Financial channel reports:

Service advantages

Help users realize the landing of threat intelligence

The collision between threat intelligence and local security logs is realized by collecting syslog logs. The access update of multi-source threat intelligence changes the disadvantage that single threat intelligence cannot be used by multiple devices and reduces the resource input; At the same time, it provides API interface, security equipment and security management platform for rapid integration, which reduces the development workload of users during the landing process of threat intelligence.

Improve the management and application of threat intelligence

The functions of intelligence management and intelligence aggregation can simplify the workload of user threat intelligence management and update, ensure real-time update and rapid aggregation of intelligence, and greatly improve the level of user threat intelligence management and application.

Form a closed loop of threat intelligence utilization

To change the disadvantages of single intelligence consumption, establish a complete intelligence utilization loop in the user's local area, so that the user's local terminal and equipment are both consumers and producers of threat intelligence, and promote the improvement of threat intelligence quality.

Enhance security threat detection and disposal capabilities

By integrating threat intelligence, the capability of the original security equipment can be effectively improved to deal with unknown threats and APT attacks. Rich contextual information of threat intelligence can be utilized to help users effectively understand threats and reduce the difficulty of security problem disposal.

The realization of security device log unified storage analysis

The log information of the original security equipment and solutions is integrated and stored in the threat intelligence platform through normalized processing, which is used for correlation analysis and collision with the aggregated threat intelligence to provide users with the security early warning function based on threat intelligence.

Service advantages

The typical process digital twin simulation verification environment for water utilities was established

The digital twin technology is used to realize the simulation modeling of key information facilities of water utilities, realize the digital twin data description and visual display form of typical process links such as sewage, and display the operation situation and security situation of typical processes of water utilities in a comprehensive, accurate, three-dimensional and real-time manner.

Establish safety risk analysis capability for industrial control system of water utilities

The vulnerability scanning and vulnerability mining of typical and mainstream industrial control equipment of water utilities are realized, and the security vulnerability and attack possibility of current mainstream network topology are evaluated. To realize the safety risk assessment of typical process flow and the improvement of safety reinforcement capacity.

Establish the ability of security attack and defense drill for emergency response plan

By deploying honeypot and attack and defense shooting range of water industry, active trapping of attack behavior, analysis modeling of typical attack behavior and attack and defense drill are realized. Combined with the technical requirements of security plan of water business system, the emergency handling capability under the scene of emergent security incident is realized.

Establish the practical training ability of safety skills based on water simulation and verification environment

Based on the simulation verification environment, the safety technical requirements, safety management requirements and the actual business environment are effectively combined to establish the skills training and practical training ability of safety professional technical personnel for the water industry.

Service advantages

TICPSH Functional Safety Research Institute gathers a group of experts from well-known enterprises and universities at home and abroad, and keeps itself in the forefront of industry technology through active cooperation with major companies worldwide. With the technical strength of the team and rich industry experience, the team can provide international level functional safety guidance and consultation for many national strategic key systems, and can provide full life cycle solutions and technical cases from the system structure design, development process system, to the final system test integration link.

Service advantages

The team brings together a group of security experts of industrial control system, and establishes close cooperation with numerous information security laboratories at home and abroad, which can provide full life cycle information security consulting services for the national key industrial infrastructure industry.

 

The research field

This laboratory focuses on the research of embedded vehicle-mounted system information security penetration, abnormal intrusion detection, vehicle controller safety reinforcement, expected function safety verification and other technologies. We welcome the academic community and the industry to carry out technical cooperation and exchange and joint technical research, so as to provide effective technical support for enhancing the information security of vehicle-mounted embedded systems.

 

 

Is Internet of Vehicles the biggest market for 5G? First understand what the Internet of cars is!


Live courses

Course salon

Technological tool

Ask and answer each other

The knowledge base

Industry information

Service advantages

Support ten million connections and concurrent ten thousand peak loads.

The service availability reaches 99% above, has the complete downtime response mechanism.

It supports the real-time display of the total number of intelligent terminals, the total number of online terminals, the number of offline terminals and the number of alarms. Supports display by region.

Support security monitoring and audit for NB-IOT, Macbee, WiFi, Zigbee, Lora and other intelligent terminals of internet of things.

Support multiple ways to display the number of online and offline intelligent terminals in real time, support classified statistics, support display by region.