Table of Content
1. Overview of Automotive Cybersecurity Industry
1.1 Definition of Automotive Cybersecurity
1.2 Typical Risks of Automotive Cybersecurity
1.3 Vehicle Cybersecurity Features and Functional Objectives
1.4 Cybersecurity Architecture
1.5 Cybersecurity Design Ideas
1.6 Vehicle Protection Safety
1.6.1 Operating System Security
1.6.2 Security Middleware
1.6.3 Gateway Cybersecurity
1.6.4 Cockpit Cybersecurity
1.7 Cloud Cybersecurity
1.8 Automotive Cybersecurity Software Product Range
1.9 Automotive Cybersecurity Market Size
1.10 Main Technologies on Cybersecurity and Applied Scenarios
1.11 ICV Cybersecurity Technology Roadmap
1.12 Cybersecurity Technology Development Direction
1.13 Automotive Cybersecurity Industry Chain
1.14 Standards & Regulations
1.15 Development Trends of Automotive Cybersecurity
1.15.1 Technology Trends
1.15.2 Industry Trends
1.16 Suggestions for Development of Cybersecurity
2. Cryptography Technology
2.1 Business Cryptography at a Glance
2.2 Cryptographic Security Applications for IoV
2.3 Password Security in Main Scenarios of Internet of Vehicles
2.3.1 Cloud Security Application
2.3.2 V2X Application
2.3.3 In-vehicle Safety Application
2.4 Challenges of Cryptography in Automotive Cybersecurity and Development Suggestions
3. PKI System
3.1 PKI Overview
3.2 PKI Application Scenarios and Market Size
3.3 Summary of Chinese PKI Companies
3.4 Digital Certificate
3.5 Digital Certificate Application Scenarios
3.6 Cooperation between Digital Certificate Vendors and OEMs
3.7 Root Certificate
4. IDPS & SecOC
4.1 IDPS Overview
4.2 IDPS Architecture
4.3 IDPS Layout of Main Companies
4.4 SecOC Overview
4.5 SecOC Solution
5. Testing Platform
5.1 Overview of Cybersecurity Testing and Certification
5.2 Main Indicators about Penetration Testing
5.3 Current Situation of Automotive Penetration Testing in China
5.4 Automotive Cybersecurity Protection Requirements
5.5 Key Components Penetration Testing Project
5.6 Major Suppliers and Testing Platforms of Automotive Cybersecurity in China
5.7 Issues and Suggestions on China’s Automotive Cybersecurity Testing
6. Automotive Cybersecurity Software Suppliers
6.1 Shanghai Thinktech
6.1.1 RutileVSS Security Encryption Software
6.1.2 In-vehicle Safety System Function Module
6.2 Shanghai ZC Technology
6.2.1 Cybersecurity Lib Software Composition
6.2.2 Cybersecurity Lib Software Functions
6.3 JIT
6.3.1 JIT Product System
6.3.2 JIT PKI
6.3.3 JIT V2X PKI
6.3.4 JIT Identity and Access Management (IAM)
6.3.5 JIT Password Comprehensive Service Management Platform
6.3.6 JIT Secure Blockchain Platform
6.3.7 JIT Data Security Solution
6.4 KOAL Software
6.4.1 Product System
6.4.2 Intelligent Vehicle Connectivity PKI
6.4.3 IoT Security Solutions
6.4.4 Key Customers
6.5 Sansec
6.5.1 Main Products and Revenue
6.5.2 Product Revenue by Applied Scenario
6.5.3 Key Customers and Suppliers
6.5.4 R&D
6.5.5 IoV Solutions
6.6 Sheng An Information
6.6.1 V2X Security Authentication System
6.6.2 OTA Upgrade Security Solution
6.6.3 Digital Key Security Solution
6.6.4 IoV Security Solution
6.7 Beijing i-wall Institute of Technology
6.7.1 Product System
6.7.2 IoV Security Products
6.7.3 IoV Security Solutions
6.8 GFA E-Commerce Security CA
6.9 UAES
6.10 ETAS
6.10.1 ETAS Cybersecurity Solutions (1)
6.10.2 ETAS Cybersecurity Solutions (2)
6.10.3 ETAS Cybersecurity Solutions (3)
6.10.4 ETAS Cybersecurity Solutions (4)
6.10.5 ETAS Cybersecurity Solutions (5)
6.10.6 ETAS Cybersecurity Services
6.11 Panqi Tech
6.11.1 AutoTrust? SCMS
6.11.2 AutoTrust? AFW
6.11.3 AutoTrust? V2X
6.11.4 AutoTrust? V2D
6.11.5 AutoTrust? V2G
6.12 Shanghai Industrial Control Safety Innovation Technology
6.12.1 Automotive Cybersecurity Testing & Training Platform
6.12.2 ITB AUTO Automotive Cybersecurity Monitoring Platform
6.12.3 Vehicle IDPS Solutions
6.12.4 Parts Testing
6.13 Vector
6.13.1 Vector Cybersecurity Software Solutions
6.13.2 Vector Cybersecurity Hardware Solutions
6.13.3 Vector Cybersecurity Testing
6.14 Synopsys
6.15 Vecentek
6.15.1 deCORE IDPS
6.15.2 Cybersecurity and Data Security Solutions
6.15.3 Security Testing Tool
6.16 Beijing Qingtian Xin’an Technology
6.16.1 SecOC Solution
6.16.2 Vehicle IDPS
6.17 China Automotive Innovation Corporation (CAIC)
6.17.1 Vehicle Distributed IDPS
6.17.2 Threat Detection and Analysis Platform
6.17.3 Cybersecurity Compliance Testing Laboratory
6.17.4 Vehicle Network Attack and Defense Range
6.18 360 Digital Security Group
6.19 Beijing Jingwei HiRain Technologies
6.20 INCHTEK
6.21 SecDeer.com
6.22 GoGoByte
6.23 HongKe Electronics
6.24 SECZONE Group
6.25 Software Safety Technology
6.26 Suresoft Tech
6.27 BANGCLE