China Automotive Cybersecurity Software Research Report, 2022
  • Oct.2022
  • Hard Copy
  • USD $3,800
  • Pages:190
  • Single User License
    (PDF Unprintable)       
  • USD $3,600
  • Code: YSJ112
  • Enterprise-wide License
    (PDF Printable & Editable)       
  • USD $5,400
  • Hard Copy + Single User License
  • USD $4,000
      

Chinese in-vehicle terminal PKI market will be worth RMB1.89 billion in 2025.

The working principle of PKI (Public Key Infrastructure) is: the infrastructure that provides security services established by leveraging public key cryptography technology, and provides users with certificate management and key management, etc., in a bid for identity authenticity, information confidentiality and other goals.

anquan 软件 1_副本.png

China's automobile cybersecurity is protected mainly by the PKI system by far. The asymmetric encryption technology based on PKI is applied to various links such as onboard devices, Internet of Vehicles operation, and network communication, and plays a core role in the security protection at all levels of cloud, communication, and terminals. As for in-vehicle terminals, various terminal devices need to be embedded with security chips to manage keys and encryption operations; all communications with the outside world also require to be encrypted, driving the robust demand for PKI.

Facilitated by the factors like the expanding demand for automotive cybersecurity protection and the rapid rise in the penetration rate of Internet of Vehicles, Chinese PKI market size of in-vehicle terminals will expectedly reach RMB920 million to RMB1,890 million from 2022 to 2025, with an average annual growth rate of 27%.

anquan 软件 2_副本.png

Of the PKI application scenarios, V2X is the focus of major suppliers. The use of PKI system to on-board unit (OBU), roadside unit (RSU), service provider (SP), and secure communication and identity authentication between cloud platforms will be the mainspring of future development.

anquan 软件 3_副本.png

KOAL Software is one of the early developers of PKI products in China, and has formed three major product systems: PKI infrastructure products, PKI security application products, and general security products.

KOAL's PKI solution for intelligent vehicle connectivity is centered round the V2X-PKI security service system, integrates IEEE1609.2 international standards and GB/T 37374 national standards, meets ITS standards and Ministry of Transport standards, and also supports GM (China Cryptography) algorithms.

In the automotive sector, KOAL Software has SAIC as its main customer and has built a security certificate management system for the wireless communication technology of the Internet of Vehicles for SAIC Prospective Technology Research Department, including V2X and V2N security certificate systems. In addition, it also built a comprehensive certificate management system, digital certificate authentication system, and signature verification system for SAIC Cloud Data Center mobile office project, and built a cloud PKI system for SAIC Motor Overseas Intelligent Mobility Technology Co., Ltd.

In 2022, KOAL Software's products in automotive field expand from identity authentication system to data security system of the Internet of Vehicles. The "Guidelines for the Application of Internet of Vehicles Transmission Security Protection Based on Domestic Cryptography" has been successfully approved, becoming the first group standard to pass the expert review of Shanghai Business Cryptography Association.

anquan 软件 4_副本.png

Changchun Jilin University Zhengyuan Information Technologies Co., Ltd. (hereinafter referred to as JIT) is the main member and sub project convener of WG3 (cryptography Working Group), WG4 (Authentication and Authorization Working Group), WG5 (Cybersecurity Assessment Working Group), WG7 (Cybersecurity Management Working Group) and SWG-BDS (Special Working Group on Big Data Security Standards) of National Cybersecurity Standardization Technical Committee. JIT is also one of the main constitutors of standards about PKI electronic certification products in China.

JIT has developed product lines such as password security, identity and access security, data security and security applications, and formed six star products: PKI, V2X PKI, identity and access management (IAM), password comprehensive service management platform, secure blockchain platform and data security solutions.

In respect of V2X PKI, based on the digital certificate format specification of GM/T 0015 SM2 cryptographic algorithm, JIT combines various application scenarios of transportation information systems, and focuses on the requirements of ITS (Intelligent Transportation System) application on the length, computing efficiency, etc. of digital certificates. The format of the ITS equipment certificate has been redefined, and JIT developed the ITS digital certificate product independently to provide technical and product support for intelligent transportation.

China Automotive Cybersecurity Software Research Report, 2022 highlights the following:
20120114.gifAutomotive cybersecurity system architecture and key software product range;
20120114.gifThe application of cryptographic technology and PKI system in the Internet of Vehicles system, main enterprises and products;
20120114.gifThe application of IDPS in automotive cybersecurity defense system, main enterprises and solutions;
20120114.gifStatus quo of China's automotive cybersecurity testing, major companies and testing platforms;
20120114.gifDevelopment trends and suggestions for automotive cybersecurity.

1. Overview of Automotive Cybersecurity Industry
1.1 Definition of Automotive Cybersecurity
1.2 Typical Risks of Automotive Cybersecurity
1.3 Vehicle Cybersecurity Features and Functional Objectives
1.4 Cybersecurity Architecture
1.5 Cybersecurity Design Ideas
1.6 Vehicle Protection Safety
1.6.1 Operating System Security
1.6.2 Security Middleware
1.6.3 Gateway Cybersecurity
1.6.4 Cockpit Cybersecurity
1.7 Cloud Cybersecurity
1.8 Automotive Cybersecurity Software Product Range
1.9 Automotive Cybersecurity Market Size
1.10 Main Technologies on Cybersecurity and Applied Scenarios
1.11 ICV Cybersecurity Technology Roadmap
1.12 Cybersecurity Technology Development Direction
1.13 Automotive Cybersecurity Industry Chain
1.14 Standards & Regulations
1.15 Development Trends of Automotive Cybersecurity
1.15.1 Technology Trends
1.15.2 Industry Trends
1.16 Suggestions for Development of Cybersecurity
 
2. Cryptography Technology
2.1 Business Cryptography at a Glance
2.2 Cryptographic Security Applications for IoV
2.3 Password Security in Main Scenarios of Internet of Vehicles
2.3.1 Cloud Security Application
2.3.2 V2X Application
2.3.3 In-vehicle Safety Application
2.4 Challenges of Cryptography in Automotive Cybersecurity and Development Suggestions 
 
3. PKI System
3.1 PKI Overview
3.2 PKI Application Scenarios and Market Size
3.3 Summary of Chinese PKI Companies
3.4 Digital Certificate
3.5 Digital Certificate Application Scenarios
3.6 Cooperation between Digital Certificate Vendors and OEMs
3.7 Root Certificate

4. IDPS & SecOC
4.1 IDPS Overview
4.2 IDPS Architecture
4.3 IDPS Layout of Main Companies
4.4 SecOC Overview
4.5 SecOC Solution
 
5. Testing Platform
5.1 Overview of Cybersecurity Testing and Certification
5.2 Main Indicators about Penetration Testing
5.3 Current Situation of Automotive Penetration Testing in China
5.4 Automotive Cybersecurity Protection Requirements
5.5 Key Components Penetration Testing Project
5.6 Major Suppliers and Testing Platforms of Automotive Cybersecurity in China
5.7 Issues and Suggestions on China's Automotive Cybersecurity Testing
 
6. Automotive Cybersecurity Software Suppliers
6.1 Shanghai Thinktech
6.1.1 RutileVSS Security Encryption Software
6.1.2 In-vehicle Safety System Function Module
6.2 Shanghai ZC Technology
6.2.1 Cybersecurity Lib Software Composition
6.2.2 Cybersecurity Lib Software Functions
6.3 JIT
6.3.1 JIT Product System
6.3.2 JIT PKI
6.3.3 JIT V2X PKI
6.3.4 JIT Identity and Access Management (IAM)
6.3.5 JIT Password Comprehensive Service Management Platform
6.3.6 JIT Secure Blockchain Platform
6.3.7 JIT Data Security Solution
6.4 KOAL Software
6.4.1 Product System
6.4.2 Intelligent Vehicle Connectivity PKI
6.4.3 IoT Security Solutions
6.4.4 Key Customers
6.5 Sansec
6.5.1 Main Products and Revenue
6.5.2 Product Revenue by Applied Scenario
6.5.3 Key Customers and Suppliers
6.5.4 R&D
6.5.5 IoV Solutions
6.6 Sheng An Information
6.6.1 V2X Security Authentication System
6.6.2 OTA Upgrade Security Solution
6.6.3 Digital Key Security Solution
6.6.4 IoV Security Solution
6.7 Beijing i-wall Institute of Technology
6.7.1 Product System
6.7.2 IoV Security Products
6.7.3 IoV Security Solutions
6.8 GFA E-Commerce Security CA
6.9 UAES
6.10 ETAS
6.10.1 ETAS Cybersecurity Solutions (1)
6.10.2 ETAS Cybersecurity Solutions (2)
6.10.3 ETAS Cybersecurity Solutions (3)
6.10.4 ETAS Cybersecurity Solutions (4)
6.10.5 ETAS Cybersecurity Solutions (5)
6.10.6 ETAS Cybersecurity Services
6.11 Panqi Tech
6.11.1 AutoTrust? SCMS
6.11.2 AutoTrust? AFW
6.11.3 AutoTrust? V2X
6.11.4 AutoTrust? V2D
6.11.5 AutoTrust? V2G
6.12 Shanghai Industrial Control Safety Innovation Technology
6.12.1 Automotive Cybersecurity Testing & Training Platform
6.12.2 ITB AUTO Automotive Cybersecurity Monitoring Platform
6.12.3 Vehicle IDPS Solutions
6.12.4 Parts Testing
6.13 Vector
6.13.1 Vector Cybersecurity Software Solutions
6.13.2 Vector Cybersecurity Hardware Solutions
6.13.3 Vector Cybersecurity Testing
6.14 Synopsys
6.15 Vecentek
6.15.1 deCORE IDPS
6.15.2 Cybersecurity and Data Security Solutions
6.15.3 Security Testing Tool
6.16 Beijing Qingtian Xin’an Technology
6.16.1 SecOC Solution 
6.16.2 Vehicle IDPS
6.17 China Automotive Innovation Corporation (CAIC) 
6.17.1 Vehicle Distributed IDPS
6.17.2 Threat Detection and Analysis Platform
6.17.3 Cybersecurity Compliance Testing Laboratory
6.17.4 Vehicle Network Attack and Defense Range
6.18 360 Digital Security Group
6.19 Beijing Jingwei HiRain Technologies
6.20 INCHTEK
6.21 SecDeer.com
6.22 GoGoByte
6.23 HongKe Electronics
6.24 SECZONE Group
6.25 Software Safety Technology
6.26 Suresoft Tech
6.27 BANGCLE

 

Smart Car Information Security (Cybersecurity and Data Security) Research Report, 2025

Research on Automotive Information Security: AI Fusion Intelligent Protection and Ecological Collaboration Ensure Cybersecurity and Data Security At present, what are the security risks faced by inte...

New Energy Vehicle 800-1000V High-Voltage Architecture and Supply Chain Research Report, 2025

Research on 800-1000V Architecture: to be installed in over 7 million vehicles in 2030, marking the arrival of the era of full-domain high voltage and megawatt supercharging. In 2025, the 800-1000V h...

Foreign Tier 1 ADAS Suppliers Industry Research Report 2025

Research on Overseas Tier 1 ADAS Suppliers: Three Paths for Foreign Enterprises to Transfer to NOA Foreign Tier 1 ADAS suppliers are obviously lagging behind in the field of NOA. In 2024, Aptiv (2.6...

VLA Large Model Applications in Automotive and Robotics Research Report, 2025

ResearchInChina releases "VLA Large Model Applications in Automotive and Robotics Research Report, 2025": The report summarizes and analyzes the technical origin, development stages, application cases...

OEMs’ Next-generation In-vehicle Infotainment (IVI) System Trends Report, 2025

ResearchInChina releases the "OEMs’ Next-generation In-vehicle Infotainment (IVI) System Trends Report, 2025", which sorts out iterative development context of mainstream automakers in terms of infota...

Autonomous Driving SoC Research Report, 2025

High-level intelligent driving penetration continues to increase, with large-scale upgrading of intelligent driving SoC in 2025 In 2024, the total sales volume of domestic passenger cars in China was...

China Passenger Car HUD Industry Report, 2024

ResearchInChina released the "China Passenger Car HUD Industry Report, 2025", which sorts out the HUD installation situation, the dynamics of upstream, midstream and downstream manufacturers in the HU...

ADAS and Autonomous Driving Tier 1 Suppliers Research Report, 2025 – Chinese Companies

ADAS and Autonomous Driving Tier 1 Suppliers Research Report, 2025 – Chinese Companies Research on Domestic ADAS Tier 1 Suppliers: Seven Development Trends in the Era of Assisted Driving 2.0 In the ...

Automotive ADAS Camera Report, 2025

①In terms of the amount of installed data, installations of side-view cameras maintain a growth rate of over 90%From January to May 2025, ADAS cameras (statistical scope: front-view, side-view, surrou...

Body (Zone) Domain Controller and Chip Industry Research Report,2025

Body (Zone)  Domain Research: ZCU Installation Exceeds 2 Million Units, Evolving Towards a "Plug-and-Play" Modular Platform The body (zone) domain covers BCM (Body Control Module), BDC (Body Dom...

Automotive Cockpit Domain Controller Research Report, 2025

Cockpit domain controller research: three cockpit domain controller architectures for AI Three layout solutions for cockpit domain controllers for deep AI empowerment As intelligent cockpit tran...

China Passenger Car Electronic Control Suspension Industry Research Report, 2025

Electronic control suspension research: air springs evolve from single chamber to dual chambers, CDC evolves from single valve to dual valves ResearchInChina released  "China Passenger Car Elect...

Automotive XR Industry Report, 2025

Automotive XR industry research: automotive XR application is still in its infancy, and some OEMs have already made forward-looking layout  The Automotive XR Industry Report, 2025, re...

Intelligent Driving Simulation and World Model Research Report, 2025

1. The world model brings innovation to intelligent driving simulation In the advancement towards L3 and higher-level autonomous driving, the development of end-to-end technology has raised higher re...

Autonomous Driving Map (HD/LD/SD MAP, Online Reconstruction, Real-time Generative Map) Industry Report 2025

Research on Autonomous Driving Maps: Evolve from Recording the Past to Previewing the Future with "Real-time Generative Maps" "Mapless NOA" has become the mainstream solution for autonomous driving s...

End-to-End Autonomous Driving Research Report, 2025

End-to-End Autonomous Driving Research: E2E Evolution towards the VLA Paradigm via Synergy of Reinforcement Learning and World Models??The essence of end-to-end autonomous driving lies in mimicking dr...

Research Report on OEMs and Tier1s’ Intelligent Cockpit Platforms (Hardware & Software) and Supply Chain Construction Strategies, 2025

Research on intelligent cockpit platforms: in the first year of mass production of L3 AI cockpits, the supply chain accelerates deployment of new products An intelligent cockpit platform primarily r...

Automotive EMS and ECU Industry Report, 2025

Research on automotive EMS: Analysis on the incremental logic of more than 40 types of automotive ECUs and EMS market segments In this report, we divide automotive ECUs into five major categories (in...

2005- www.researchinchina.com All Rights Reserved 京ICP备05069564号-1 京公网安备1101054484号