Face recognition

Applied scenarios: face scanning boarding, keyless entry.

Face login & personalization

Applied scenarios: automatically adjust preferred seat temperature/seat angle/AC temperature/entrainment program playing.

Facial login solution: manufacturer-accepted facial login solution that connects manufacturer accounts to realize in-car automatic monitoring for facial login.

Paying with face

Applied scenarios: buy movie tickets by using face payment, farewell to tediousness.

Fatigue driving monitoring

Applied scenarios: identifications for characteristics of fatigue driving.

Fatigue driving monitoring application SDK + hardware configuration requirements.

Fatigue driving monitoring SDK + camera hardware.

AR Navigation

Applied scenarios: based on augmented reality technologies to expand driver’s visual range and to provide an immersive driving visual experience.

Car machine + camera.

Panoramic HUD + camera.

Vehicle cyber security solutions

1. IDPS, Intrusion Detection and Prevention System(IDPS)

Application defender: blocks suspicious application installation and execution. Prevents system application to be compromised and removed.

Secure boot: makes sure to boot using only software that is trusted by OEM.

Elevated privileges detection: detects abnormal behavior of processes, threads, system configures etc.

Privacy protection: denial of access to privacy data without user authorization.

Secure command: uses advanced heuristics to detect CAN message, identifies threat command.

2. Car FireWall

Subnets isolation: secure isolation between in-vehicle network and Internet.

Access control: access control based on IP/PORT/APP.

Protocol filtering: application Layer Security filtering based on protocol identification.

Real-time blocking: detection, warning, blocking based on abnormal network traffic in real time.

Security audit: log storage, security audit based on kernel driven technology.

Policy management: supports off-line policy configuration, easy to deploy.

Key management: Software or hardware level key secure storage.

3. Secure OTA Kits

Support Android, Linux platforms, support python, java, C++ interface, support Android recovery mode.

Provide vehicle-side and server-side operation tools, user friendly, easy to operate, integrate and deploy.

Support two-way identity authentication of upgrade package, encryption and decryption of upgrade package, anti-downgrade, tamper-resistant, device authentication, and invalidation mechanism for token.

Support business data secure transportation, regardless of channel security such as TLS.

Support cutting large size upgrade package into reasonable size to verification, reduce memory consumption and save the hardware cost.

Support OTA updating and USB off-line updating.