China Automotive Cybersecurity Software Research Report, 2022

China Automotive Cybersecurity Software Research Report, 2022

Chinese in-vehicle terminal PKI market will be worth RMB1.89 billion in 2025.

The working principle of PKI (Public Key Infrastructure) is: the infrastructure that provides security services established by leveraging public key cryptography technology, and provides users with certificate management and key management, etc., in a bid for identity authenticity, information confidentiality and other goals.

China's automobile cybersecurity is protected mainly by the PKI system by far. The asymmetric encryption technology based on PKI is applied to various links such as onboard devices, Internet of Vehicles operation, and network communication, and plays a core role in the security protection at all levels of cloud, communication, and terminals. As for in-vehicle terminals, various terminal devices need to be embedded with security chips to manage keys and encryption operations; all communications with the outside world also require to be encrypted, driving the robust demand for PKI.

Facilitated by the factors like the expanding demand for automotive cybersecurity protection and the rapid rise in the penetration rate of Internet of Vehicles, Chinese PKI market size of in-vehicle terminals will expectedly reach RMB920 million to RMB1,890 million from 2022 to 2025, with an average annual growth rate of 27%.

Of the PKI application scenarios, V2X is the focus of major suppliers. The use of PKI system to on-board unit (OBU), roadside unit (RSU), service provider (SP), and secure communication and identity authentication between cloud platforms will be the mainspring of future development.

KOAL Software is one of the early developers of PKI products in China, and has formed three major product systems: PKI infrastructure products, PKI security application products, and general security products.

KOAL's PKI solution for intelligent vehicle connectivity is centered round the V2X-PKI security service system, integrates IEEE1609.2 international standards and GB/T 37374 national standards, meets ITS standards and Ministry of Transport standards, and also supports GM (China Cryptography) algorithms.

In the automotive sector, KOAL Software has SAIC as its main customer and has built a security certificate management system for the wireless communication technology of the Internet of Vehicles for SAIC Prospective Technology Research Department, including V2X and V2N security certificate systems. In addition, it also built a comprehensive certificate management system, digital certificate authentication system, and signature verification system for SAIC Cloud Data Center mobile office project, and built a cloud PKI system for SAIC Motor Overseas Intelligent Mobility Technology Co., Ltd.

In 2022, KOAL Software's products in automotive field expand from identity authentication system to data security system of the Internet of Vehicles. The ""Guidelines for the Application of Internet of Vehicles Transmission Security Protection Based on Domestic Cryptography"" has been successfully approved, becoming the first group standard to pass the expert review of Shanghai Business Cryptography Association.

Changchun Jilin University Zhengyuan Information Technologies Co., Ltd. (hereinafter referred to as JIT) is the main member and sub project convener of WG3 (cryptography Working Group), WG4 (Authentication and Authorization Working Group), WG5 (Cybersecurity Assessment Working Group), WG7 (Cybersecurity Management Working Group) and SWG-BDS (Special Working Group on Big Data Security Standards) of National Cybersecurity Standardization Technical Committee. JIT is also one of the main constitutors of standards about PKI electronic certification products in China.

JIT has developed product lines such as password security, identity and access security, data security and security applications, and formed six star products: PKI, V2X PKI, identity and access management (IAM), password comprehensive service management platform, secure blockchain platform and data security solutions.

In respect of V2X PKI, based on the digital certificate format specification of GM/T 0015 SM2 cryptographic algorithm, JIT combines various application scenarios of transportation information systems, and focuses on the requirements of ITS (Intelligent Transportation System) application on the length, computing efficiency, etc. of digital certificates. The format of the ITS equipment certificate has been redefined, and JIT developed the ITS digital certificate product independently to provide technical and product support for intelligent transportation.

China Automotive Cybersecurity Software Research Report, 2022 highlights the following:
Automotive cybersecurity system architecture and key software product range;
The application of cryptographic technology and PKI system in the Internet of Vehicles system, main enterprises and products;
The application of IDPS in automotive cybersecurity defense system, main enterprises and solutions;
Status quo of China's automotive cybersecurity testing, major companies and testing platforms;
Development trends and suggestions for automotive cybersecurity

Please Note: PDF E-mail from Publisher purchase option allows up to 10 users and does not allow printing or editing. This functionality will require a Global Site License.


1. Overview of Automotive Cybersecurity Industry
1.1 Definition of Automotive Cybersecurity
1.2 Typical Risks of Automotive Cybersecurity
1.3 Vehicle Cybersecurity Features and Functional Objectives
1.4 Cybersecurity Architecture
1.5 Cybersecurity Design Ideas
1.6 Vehicle Protection Safety
1.6.1 Operating System Security
1.6.2 Security Middleware
1.6.3 Gateway Cybersecurity
1.6.4 Cockpit Cybersecurity
1.7 Cloud Cybersecurity
1.8 Automotive Cybersecurity Software Product Range
1.9 Automotive Cybersecurity Market Size
1.10 Main Technologies on Cybersecurity and Applied Scenarios
1.11 ICV Cybersecurity Technology Roadmap
1.12 Cybersecurity Technology Development Direction
1.13 Automotive Cybersecurity Industry Chain
1.14 Standards & Regulations
1.15 Development Trends of Automotive Cybersecurity
1.15.1 Technology Trends
1.15.2 Industry Trends
1.16 Suggestions for Development of Cybersecurity
2. Cryptography Technology
2.1 Business Cryptography at a Glance
2.2 Cryptographic Security Applications for IoV
2.3 Password Security in Main Scenarios of Internet of Vehicles
2.3.1 Cloud Security Application
2.3.2 V2X Application
2.3.3 In-vehicle Safety Application
2.4 Challenges of Cryptography in Automotive Cybersecurity and Development Suggestions
3. PKI System
3.1 PKI Overview
3.2 PKI Application Scenarios and Market Size
3.3 Summary of Chinese PKI Companies
3.4 Digital Certificate
3.5 Digital Certificate Application Scenarios
3.6 Cooperation between Digital Certificate Vendors and OEMs
3.7 Root Certificate
4. IDPS & SecOC
4.1 IDPS Overview
4.2 IDPS Architecture
4.3 IDPS Layout of Main Companies
4.4 SecOC Overview
4.5 SecOC Solution
5. Testing Platform
5.1 Overview of Cybersecurity Testing and Certification
5.2 Main Indicators about Penetration Testing
5.3 Current Situation of Automotive Penetration Testing in China
5.4 Automotive Cybersecurity Protection Requirements
5.5 Key Components Penetration Testing Project
5.6 Major Suppliers and Testing Platforms of Automotive Cybersecurity in China
5.7 Issues and Suggestions on China's Automotive Cybersecurity Testing
6. Automotive Cybersecurity Software Suppliers
6.1 Shanghai Thinktech
6.1.1 RutileVSS Security Encryption Software
6.1.2 In-vehicle Safety System Function Module
6.2 Shanghai ZC Technology
6.2.1 Cybersecurity Lib Software Composition
6.2.2 Cybersecurity Lib Software Functions
6.3 JIT
6.3.1 JIT Product System
6.3.2 JIT PKI
6.3.3 JIT V2X PKI
6.3.4 JIT Identity and Access Management (IAM)
6.3.5 JIT Password Comprehensive Service Management Platform
6.3.6 JIT Secure Blockchain Platform
6.3.7 JIT Data Security Solution
6.4 KOAL Software
6.4.1 Product System
6.4.2 Intelligent Vehicle Connectivity PKI
6.4.3 IoT Security Solutions
6.4.4 Key Customers
6.5 Sansec
6.5.1 Main Products and Revenue
6.5.2 Product Revenue by Applied Scenario
6.5.3 Key Customers and Suppliers
6.5.4 R&D
6.5.5 IoV Solutions
6.6 Sheng An Information
6.6.1 V2X Security Authentication System
6.6.2 OTA Upgrade Security Solution
6.6.3 Digital Key Security Solution
6.6.4 IoV Security Solution
6.7 Beijing i-wall Institute of Technology
6.7.1 Product System
6.7.2 IoV Security Products
6.7.3 IoV Security Solutions
6.8 GFA E-Commerce Security CA
6.9 UAES
6.10 ETAS
6.10.1 ETAS Cybersecurity Solutions (1)
6.10.2 ETAS Cybersecurity Solutions (2)
6.10.3 ETAS Cybersecurity Solutions (3)
6.10.4 ETAS Cybersecurity Solutions (4)
6.10.5 ETAS Cybersecurity Solutions (5)
6.10.6 ETAS Cybersecurity Services
6.11 Panqi Tech
6.11.1 AutoTrust® SCMS
6.11.2 AutoTrust® AFW
6.11.3 AutoTrust® V2X
6.11.4 AutoTrust® V2D
6.11.5 AutoTrust® V2G
6.12 Shanghai Industrial Control Safety Innovation Technology
6.12.1 Automotive Cybersecurity Testing & Training Platform
6.12.2 ITB AUTO Automotive Cybersecurity Monitoring Platform
6.12.3 Vehicle IDPS Solutions
6.12.4 Parts Testing
6.13 Vector
6.13.1 Vector Cybersecurity Software Solutions
6.13.2 Vector Cybersecurity Hardware Solutions
6.13.3 Vector Cybersecurity Testing
6.14 Synopsys
6.15 Vecentek
6.15.1 deCORE IDPS
6.15.2 Cybersecurity and Data Security Solutions
6.15.3 Security Testing Tool
6.16 Beijing Qingtian Xin’an Technology
6.16.1 SecOC Solution
6.16.2 Vehicle IDPS
6.17 China Automotive Innovation Corporation (CAIC)
6.17.1 Vehicle Distributed IDPS
6.17.2 Threat Detection and Analysis Platform
6.17.3 Cybersecurity Compliance Testing Laboratory
6.17.4 Vehicle Network Attack and Defense Range
6.18 360 Digital Security Group
6.19 Beijing Jingwei HiRain Technologies
6.20 INCHTEK
6.21 SecDeer.com
6.22 GoGoByte
6.23 HongKe Electronics
6.24 SECZONE Group
6.25 Software Safety Technology
6.26 Suresoft Tech
6.27 BANGCLE

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings