2019 Intelligent Connected Vehicle Technology Conference | Cloud platform, OTA, information security-the three key technologies for intelligent vehicle safety escort...

On the afternoon of December 28, the 2019 Intelligent Connected Vehicle Technology Conference, the Internet of Vehicles Information Security Technology Seminar was held in Guangzhou Huangpu Xianglan Prince Mingshi Hotel. The theme of this forum is "Vehicles and everything safety and aviation protection", with Chen Jingxiang, Product Director of Neusoft Network Security Division and Director of IoT Security R&D Center, Chen Tao, Deputy Director of China Automobile Research Institute Intelligent Networked Vehicle Testing and Research Center, and Beijing Saimu Technology Co., Ltd. General Manager Hu Dalin, Director Luo Yong of the Product Information Security Capability Center of United Automotive Electronics Co., Ltd., Li Bin, Vice President of Shanghai Ailaby Automotive Industry, and Zhan Pengyi, Security Architect of the 360 ​​Industrial Internet and Vehicle Network Security Division, and other experts and business representatives attended the seminar , The meeting was chaired by Zhang Xiong, director of the Network Technology Department of GAC Research Institute.

Safety has been a hot topic in the automotive industry in recent years. Although for traditional auto companies, current information security is not a big threat, once connected, the life safety issues of users will all depend on the intelligent networked cars delivered by auto companies and related companies. At the IoV Information Security Technology Seminar at the 2019 Intelligent Connected Vehicle Technology Conference, a number of experts from the industry conducted in-depth discussions on information security, big data, and OTA.

Chen Jingxiang, Product Director of Neusoft Network Security Division and Director of Internet of Things Security R&D Center, gave a keynote speech on "Information Security Challenges and Responses of Intelligent Connected Vehicles". He believes that from the perspective of an information security company and a security practitioner, all the current in-vehicle networks of the Internet of Vehicles, including the communication of the entire vehicle, the communication of business scenarios, and each information chain, are all likely to be attacked. . In the future, with the upgrade of the in-car network, the in-depth defense system can be separated from the network system to ensure that the entire vehicle has a focused and hierarchical security information protection.

The issue of security is still very serious around the world. According to statistics, one person dies in a traffic accident every 24 seconds in the world. Based on this, Dr. Chen Tao, deputy director of the China Automotive Research Institute of Intelligent and Connected Vehicle Testing and Research Center, delivered a keynote speech on "Smart Active Safety System Testing and Verification Technology and Practice". He said that the biggest starting point for intelligent networked cars or autonomous driving is to solve the current safety problems in traffic accidents. However, if the safety technology is not well overcome, it may further increase the hidden dangers of traffic safety. .

Hu Dalin, general manager of Beijing Saimu Technology Co., Ltd., shared the topic "Exploration and Practice of Information Security in Intelligent Connected Vehicles". Regarding vehicle data, he believes that the collection system of vehicle data is the most critical, and it determines data noise. , To achieve natural data collection, cleaning, labeling and standardized processes.

Zhang Xiong, Director of Network Technology Department of GAC Research Institute, gave a keynote speech on "Safe Driving and Internet of Vehicles". His point of view is more focused on the simultaneous planning and implementation of these three systems from cloud platform, OTA, and information security to provide safe services to vehicles. At the same time, he emphasized that information security alone is not enough. From my point of view, OTA and information security are "twin brothers". How to upgrade basic OTA information to ensure data transmission is the core.

The future development direction of automobiles will give rise to a series of application scenarios and customer needs, so in the future, it is necessary to develop electronic products based on customer needs. Focusing on this issue, Luo Yong, director of the Product Information Security Capability Center of United Automotive Electronics Co., Ltd., gave a keynote speech on "Key Technologies for Information Security of Body Electronics". Facing the challenge of information security, he pointed out that it is necessary to establish a guarantee capability for the entire life cycle of product information security; to meet the requirements of OEMs to manage the production line and product information security; to establish a defense-in-depth system and use more active defense mechanisms to respond Safe layout of fresh challenges.

Li Bin, Vice President of Shanghai Alabi Automotive Industry, gave a keynote speech on "Safety Upgrade of Intelligent Connected Vehicles". He believes that with more and more software, 60% to 70% of vehicles will be recalled due to software security issues in the future, and OTA will be regarded as a channel for product recalls. Therefore, OTA information security must also be guaranteed.

Professor Zhan Pengyi, the security architect of the 360 ​​Industrial Internet and IoV Security Division, shared that "IoV security from the perspective of offense and defense". He believes that security is hierarchical, the first is the function of secure storage of security chips. Further down is safe execution. The second is to monitor all safety data in the car, accumulate big safety data in the background, constantly update safety data, and through domestic and foreign forums and new research results at home and abroad, including hacker attack cases, can be integrated into the user database to improve Test your ability.

After the seminar, all the guests present had a heated discussion on how to integrate information security in the future. Zhan Pengyi said that in the future, we will definitely cooperate with some companies and also with suppliers. It can't be a monopoly. It's just that everyone has different divisions of labor and specializes in the technical industry. Only when everyone's strengths are brought together, can the wood The shortcomings of the barrel effect are made up to the highest.

Source: CCID Media

Guess you like

Origin blog.csdn.net/LrS62520kV/article/details/103790524