a mobility security company

41
The Automotive Tech Company of the Year Finalist 2020 Best Auto Cybersecurity Product/Service 2019 2020 Global Cyber Achievement Award 2020 Automotive Cybersecurity Company of the Year Artificial Intelligence Industry Association 2020 Emerging AI+X Top 100 Company Mobility Category Copyright by AUTOCRYPT Co., Ltd. All rights reserved. a Mobility Security Company for Autonomous, Connected Vehicles, and Beyond

Upload: others

Post on 04-Jun-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: a Mobility Security Company

The Automotive Tech Company of the Year Finalist 2020

Best Auto CybersecurityProduct/Service 2019

2020 Global Cyber Achievement Award

2020 Automotive Cybersecurity Company of the Year

Artificial Intelligence Industry Association2020 Emerging AI+X Top 100 CompanyMobility Category

Copyright by AUTOCRYPT Co., Ltd. All rights reserved.

a Mobility Security Companyfor Autonomous, Connected Vehicles, and Beyond

Page 2: a Mobility Security Company

Confidential – Subject to NDA

Is the leading security solutions providerfor autonomous vehicles

–As vehicles become increasingly connected, automated, and shared, cybersecurity for these connections becomes that much moreessential in the rapidly-evolving framework of Smart Mobility. AUTOCRYPT, backed by decades of industry expertise and know-how,

meets the challenge of protecting the future of Autonomous Vehicles and Smart Mobility.

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

2

Page 3: a Mobility Security Company

Confidential – Subject to NDA 3

Company Name

CEO

Established

# of Employees

Location

Business Areas

Core Members

AUTOCRYPT Co., Ltd.

Daniel Eui-seok Kim

August 23, 2019

70 (50 Development / Engineering) as of May 2020

Yeoido, Seoul, Republic of Korea

|

|

|

|

|

| 1 - V2X Security: Secure V2X-based communications and autonomous vehicle security2 - IVS Security: In-vehicle security for protection against hacking / abnormal behavior3 - V2G Security: EV charging & authentication4 - V2D Security: Digital Key, passenger authentication5 - FMS: Fleet Management System and platform development

CEO, co-Founder

Daniel ES Kim–

COO, co-Founder

Duksoo Kim–

CTO, co-Founder

SangGyoo Sim–

CSO

Jaeson Yoo–

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 4: a Mobility Security Company

Confidential – Subject to NDA 4

History

M Development of automotive safety diagnostic device

Authentication and encryption enhanced solution for vehicle/smart device sync connection

GPS / Telematics authentication and encryptions systems integration for police patrol vehicles

Development of IEEE1609.2-based V2X security solution for WAVE

Development of Vehicle Data Management System (VDMS) for automotive big data processing

Security verification technology developed for telematics smartphone application

G

Installation and operation of Daejeon-Sejong C-ITS security system

Installation and operation of Yeoju autonomous driving security system

Installation and operation of Hwaseong K-City autonomous driving testbed security system

Development of security system for railway transport system

Development of security solution for Electric Vehicle (EV) charging system

Design of secure authentication system for Korean Expressway Corporation C-ITS project

Installation of Jeju province C-ITS security system

Development of vehicle/smartphone connection authentication security system for Samsung Electronics

Deep learning-based abnormal behavior detection function added for AutoCrypt AFW, in-vehicle hacking prevention solution

20072011

2012

2013

2014

Official commercial launch of AutoCrypt®, Smart Car Security Solution20152016

2017

2018

AUTOCRYPT Co., Ltd. established, spinoff from Penta Security Systems2019

Development of ISO15118-standard EV Plug&Charge security solution

M

M

M

M

M

G

M

G

G

G

M

G

G

M

M

1997 Penta Security Systems established with PKI-based security technology

2007 Penta Security launches automotive cybersecurity business, overseeing over 15 security projects with major automotive manufacturers for in-vehicle and external security

2015 Official commercial launch of AutoCrypt®

smart car security product

2016 Takes domestic contract for installation and operation of all smart road C-ITS projects in South Korea

2019 Spinoff of Penta Security as independent venture, AUTOCRYPT

Government / Public Institution projects

Automotive manufacturer / supplier projects

G

M

HIGHLIGHTS

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 5: a Mobility Security Company

Confidential – Subject to NDA 5

History

1997 Penta Security Systems established with PKI-based security technology

2007 Penta Security launches automotive cybersecurity business, overseeing over 15 security projects with major automotive manufacturers for in-vehicle and external security

2015 Official commercial launch of AutoCrypt®

smart car security product

2016 Takes domestic contract for installation and operation of all smart road C-ITS projects in South Korea

2019 Spinoff of Penta Security as independent venture, AUTOCRYPT

Government / Public Institution projects

Automotive manufacturer / supplier projects

G

M

HIGHLIGHTS

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

AUTOCRYPT Co., Ltd. established, spinoff from Penta Security Systems

Installation and operation of Gwangju C-ITS project security system

Certification for C-V2X compatibility supporting C-SCMS standards by CAICT under IMT-2020(5G)

G

2019Contract won for Korean Expressway Corporation V2X-SCMS implementation project

Development of In-Vehicle Infotainment (IVI) security solution

G

M

M Development of automotive safety diagnostic device

2020 Official membership into Car Connectivity Consortium (CCC) and submission of Digital Key PoC

Installation and operation of Ulsan C-ITS project security systemG

Development of PnC security system for OEM company’s rapid charge systemM

Page 6: a Mobility Security Company

Confidential – Subject to NDA 6

Why autonomous vehicles?Why security?

Limitations of Sensors Hacking Vulnerabilities

At Level 3 Autonomy, the autonomous vehicle industry is at a standstill because of the

issues of development for sensor technology.

There are still driving situations that cannot be detected with sensors. Furthermore, sensors are unab

le to interpret intent of vehicles.

Risk to Human Life

In traditional IT security, breach could lead to loss of access, financial assets, or even

personal information resulting in identity theft.

However, when iit comes to automotive security, it is literally the lives of drivers, passengers, and even pe

destrians at risk.

Human life must be prioritized.

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

The reality is that this new world of connected and autonomous vehicles opens up channels of possibilities when it comes to hacking and

data breach.

In-vehicle, manufacturer OT, and even backend IT systems are at risk.

Page 7: a Mobility Security Company

Confidential – Subject to NDA 7

We are committed to ensure that the connected and autonomous vehicle experiencecan be trusted by drivers and passengers on and off the road, keeping everyone involved safe from harm.

C-level with average of 20 yearsExperience in cybersecurity

and automotive security

80% of employees dedicatedto innovation, research,

and development.

Security lead for all C-ITSprojects in South Korea,over 5000km covered

Globally recognized acrossKorea, Japan,

the United States, and China

AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 8: a Mobility Security Company

Confidential – Subject to NDA 8

We are committed to ensure that the connected and autonomous vehicle experiencecan be trusted by drivers and passengers on and off the road, keeping everyone involved safe from harm.

With decades of experience in automotive cybersecurity, AUTOCRYPT’s security expertsprovide comprehensive solutions, end-to-end.

VehiclesTrafficsignals

RSUs Mobiledevices

Pedestrians

Roads

VB

Mobiledevice

Cloud Internet

Telecom provider network

TELEMATICS IVSSecurity

V2XSecurity

V2G SecurityV2D Security

Driver Mobiledevice

Vehicleowner

Charger Chargepoint

Grid

AUTONOMOUS VEHICLE SECURITY

B

FMS

MOBILITY SECURITY

MOBILITY SECURITY

MOBILITY SECURITY

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 9: a Mobility Security Company

Confidential – Subject to NDA 9

End-to-end automotive security

IVS Security(In-vehicle Systems)

IN-VEHICLE VEHICLE + VICINITY OUTSIDE VEHICLE

AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY

FMS(Fleet Management

System)

V2D SecurityV2G SecurityV2X Security

ECU security development

Security consulting

Intrusion Detection and Prevention Systems

Mobile device

Pedestrians

Vehicles

Road

Traffic signals

Roadside units(RSUs)

Charger

Charge point

Grid

Driver

Mobile device

Vehicle owner

Digital key

Managed services

Mobility data collection

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 10: a Mobility Security Company

Confidential – Subject to NDA 10

VehiclesTrafficsignals

RSUs Mobiledevices

Pedestrians

Roads

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

V2X (Vehicle-to-Everything)

allows the vehicle to communicate with other entitiesto ensure safe, efficient autonomous vehicle operation.

V2V: Vehicle-to-VehicleV2I: Vehicle-to-Infrastructure

V2P: Vehicle-to-PedestrianV2N: Vehicle-to-Network

Page 11: a Mobility Security Company

Confidential – Subject to NDA 11

V2X ensures that not only is traffic control optimized,

but that autonomous vehicles operate securely for the vehicles themselves as well as their surroundings

Non line-of-sight awareness Conveying Intent Situational Awareness

360* awareness, eliminating blind spots. Works at nightas well as inclimate weather conditions.

Vehicles can convey intent, share data and path planning for higher levels of predictability.

Increased electronic horizon to support soft safety alertsand graduated warning.

Sudden lanechange

Reduced speedahead

Queue warning / shockwave damping

Blind intersection / vulnerable road user(VRU) alerts

* Original source: Qualcomm Roadmap

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 12: a Mobility Security Company

Confidential – Subject to NDA 12

While V2X allows for communications with many different entities,without security, V2X cannot be properly implemented

* WAVE : Wireless Access in Vehicular Environments, Wi-Fi based communications extended up to 1km while driving at 200km/h

** C-V2X : Cellular V2x, 5G-based V2X communications

V2X(Autonomous Vehicle Communications)

WAVE*

C-V2X**= + Security

Comprehensive V2X security solution with fully customizable integration

B

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 13: a Mobility Security Company

Confidential – Subject to NDA 13

B

VehiclePedestrian

mobile deviceRoadside units

(RSUs)Edge Cloud Central Cloud Big data

V2X-EEV V2X-EEM V2X-EER V2X-EEE V2X-PKI V2X-MBD

V2X authentication / electronic signature / encryption / anonymization / key managementV2X key generation

/ authenticationV2X anomaly / threat

detection

Use cases in application for automotive ECU, embedded, mobile, and virtual environments

IEEE 1609.2 standard compliant

CAMP VSC5 (SCMS v1.2) standard compliant

*

AutoCrypt V2X provides security solution for all components participatingin V2X communications, compliant with the latest standards.

* EEV: End-Entity for Vehicle, EEM: End-Entity for Mobile, EER: End-Entity for Roadside Unit,EEE: End-Entity for Edge Cloud MBD: Mis-Behavior Detection

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 14: a Mobility Security Company

Confidential – Subject to NDA 14

V2X verification speeds of 2500/s, twice as fast as industry standardand 30% faster than competitors

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Largest number of C-ITS implementationprojects with practical operation

China SCMS (C-SCMS)standard compliant

Top 5 V2X Security Companies

• ESCRYPT • On Board Security• Autotalks• AutoCrypt• Green Hills Software

-Source : V2X Cybersecurity MarketGlobal Forecast to 2025, Markets and Markets

Page 15: a Mobility Security Company

Confidential – Subject to NDA 15

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Use Case with C-ITS V2X Security Project

AUTOCRYPT was selected to begin implementing security into Korea’s smart roads in 2016, as part of Penta Security.

In the past five years, AUTOCRYPT has consistently won contracts for KEC’s C-ITS projects, giving AUTOCRYPT complete security oversight of thenation’s smart road V2X capabilities.

S E O U LY E O J U

S E J O N G

H W A S E O N G

J E J U

U L S A N

G W A N G J UH W A S E O N G K - C I T Y

One of AUTOCRYPT’s largest projects withKEC was K-City, Korea’s largest autonomousvehicle testing facility. K-City is the firstever testbed of its kind in Korea, and the second-largest in the world.

Page 16: a Mobility Security Company

Confidential – Subject to NDA 16

A vehicle’s internal system is complex,consisting of a large number of ECUs,(Electronic Control Units), which control aspects of the vehicle like the engine, brake control, and internal communication.

The ECUs are enabled by the CAN (Controller Area Network) and MOST (Media Oriented Systems Transport) bus.

Car body

Chassis

Engine

Network

Infotainment

Diagnostics& Maintenance

OBU

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 17: a Mobility Security Company

Confidential – Subject to NDA 17

With infiltration of the network, a hacker could access all the car’s major functions through the various ECUs by altering the data, corrupting operation through illicit message delivery, finding critical data storage.

This puts the driver, passengers, and those around the vehicle at risk.

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

In-VehicleInfotainment

ensures that the internal system of the vehicle is securedfrom end-to-end.

Page 18: a Mobility Security Company

Confidential – Subject to NDA 18

Security reinforcement and monitoring for ECUsAbnormal behavior / attack detection for internal

and external communication networks

Firewall

Encryption

Secure Storage

Secure Booting

Monitoring

Integrity

Access Control

OS Hardening

GatewayCore

IDS CoreStored in server

CAN Bus

CANMessage

Detected Message

forwarding logging

IVS-ECU IVS-IDS

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 19: a Mobility Security Company

Confidential – Subject to NDA 19

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Total security with AutoCrypt IVS

Gateway

ECU

ECU

Internal network

External network

ECU

- Encryption Library- Secure booting

& Remote authentication

- Secure updates- HW trust anchor

- Message authentication, confidentiality & integrity- Key management

- Traffic flow control- Abnormal traffic detection- PII and data protection

- Network security

Customized solution with third-party providers

By analyzing and detecting abnormalbehavior and communications occurring within the vehicle’s internal network, along with incorporation of Firewall and IDS, AutoCrypt IVS secures the ECUs and provides the necessarysecurity modules to allow for safe operation of the vehicle.

Page 20: a Mobility Security Company

Confidential – Subject to NDA 20

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Use Case with WP.29 Regulation Compliance

Because WP.29’s regulations are binding for the contracted parties, those that do not comply may face trade issues and challenges in brand imaging and long-term business relationships.

AUTOCRYPT provides consulting and solution review with manufacturers, suppliers, and service providers affected by the regulations.

In June 2020, the UNECE WP.29 GRVA working party announced a new set of regulations requiring comprehensive cybersecurity systems to be implemented into all new vehicle

models after July 2022.

Consulting

AutoCrypt IVS

Testing

IVS-ECU

IVS-IDS

Page 21: a Mobility Security Company

Confidential – Subject to NDA 21

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

ICEInternational Combustion Engine

HEVHybrid Electric Vehicle

BEVBattery Electric Vehicle

Electric Vehicles (EVs) can include hybrid vehicles (which utilize both a traditional combustion engine as well

as a battery-powered motor), Hydrogen fuel-cell vehicles (using a chemical reaction to power an electric motor), plug-in hybrids, and battery electric vehicles. All three utilize electricity for operation, but only BEVs rely on solely electricity and can charge on a level 3, DC fast charge.

E L E C T R I C V E H I C L E S

PHEVPlug-in Hybrid Electric Vehicle

FCEVFuel Cell Electric Vehicle

Page 22: a Mobility Security Company

Confidential – Subject to NDA 22

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

2015 2019

Korea 3,025 30,819

Japan 10,388 26,627

USA 73,715 250,453

China 135,507 721,088

0

400,000

800,000

1,200,000

Sales and ownership of EVs have been increasing in number as more drivers seek a more environmentally-friendly, economical method of transportation. The number of charge points has also increased exponentially.

Korea : 29,309

Japan : 40,018

China : 1,001,420USA : 63,303

Annual EV Sales (2015 – 2019) Total # of Charge Stations

Page 23: a Mobility Security Company

Confidential – Subject to NDA 23

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

EVs still require security...

A charger for an EV acts not only as a line of electric charge, but also a line of communication. Sending software patches, diagnostics, data transfers, along with power charge, the charger is the main line of communication.

Chargers also send along payment and personal information, requiring security protocols to be in place.

Page 24: a Mobility Security Company

Confidential – Subject to NDA 24

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Vehicle owner

Automobilemanufacturer

ISO 15118 OCPP

Vehicle

Mobility Operator (MO)

EVSE manufacturers

ChargersCharge points

Charge servicemanagement

ElectricityProvider

Charge pointmanufactuers

ISO 15118: International Standard Road vehicles – Vehicle to grid communication interface

OCPP: Open Charge Point Protocol

secures the Plug&Charge (PnC) system.

Plug&Charge is a secure, convenient way of charging EVs. The driver can plug the charging cable into the EV and the EV will automatically identif

y itself and be authorized to receive charge. Additional services can include automatic payment, charge roaming, and even bidirectional charging.

Page 25: a Mobility Security Company

Confidential – Subject to NDA 25

Electric Vehicle Charge PointMobility

Operator (MO)Electricity Provider

V2G-EEV V2G-PKI V2G-PKI V2G-PKI

V2G key management, mutual authentication

V2G contractcertificate issuance

ISO 15118 compliant

OCPP 2.0 compatible

V2G-EEC *

Providing interoperability and mutual authentication withtop-level V2G certification authorities

* EEC: End-Entity for Charger

V2G key generation/ authentication

TLS authentication / rncryption

Charge PointOperator (CPO)

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Page 26: a Mobility Security Company

Confidential – Subject to NDA 26

Hubject & Penta Security provide SaaS service with cross-certification for ISO 15118 complianceBoth are V2G Root CAs, allowing for global use of existing secure solutions with no lock-in effect.

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Use Case with ISO 15118

Hubject and Penta Security Cooperate to Provide First Global Cross Certification for Most Secure ISO 15118 based EV Charging

Hubject and Penta Security today announced their co-operation to enable standardized secure communication between electric vehicles and charging stations. The international standard ISO 15118 is mostly known for the application of the mostsecure, automated and seamless charging and payment processes for electric vehicles, Plug&Charge.

Page 27: a Mobility Security Company

Confidential – Subject to NDA 27

AUTOCRYPT created a digital key to allow drivers to have a more convenient driving experience, utilizing their phone in place of

a physical key.

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

V2D (Vehicle-to-Device)

allows for communication between the vehicle and anelectronic device.

More and more people look for a seamless driving experience without the limitations of a physical key for access.

Page 28: a Mobility Security Company

Confidential – Subject to NDA 28

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

With digital keys, secure interoperability is essential, which is why AUTOCRYPT’s Digital Key follows the Car Connectivity Consortium (CCC) Digital Key 2.0 Release standards, and is already in development to be compliant with 3.0 standards when updated.

As the first cybersecurity company in Asia-Pacific to become an official member of the CCC, AUTOCRYPT joins the ranks of major global mobile and vehicle manufacturers in ensuring the convenience and security of digital keys.

.

.

.

Page 29: a Mobility Security Company

Confidential – Subject to NDA 29

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Vehicle Access & Control

Remotely access and control the vehicle through the Digital Key as the owner or as a shared key holder. Additional functions like starting the engine and sounding the horn are also available.

Digital Key Registration & Sharing

Register the vehicle onto the AUTOCRYPT Digital Key application to install the digital key. The digital key can then be shared with multiple people through password and invite link.

Secure Usage Restrictions & Settings

Owner can fine-tune the range of functions like duration of access, engine control, maximum speed. Owners can modify permissions, opt out of sharing, or extend sharing at their discretion.

Use Case with AUTOCRYPT Digital Key

Page 30: a Mobility Security Company

Confidential – Subject to NDA 30

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

The rise of connectivity has brought mobility to the forefront, and with it has brought Mobility-as-a-Service business models.

As an on-demand service, MaaS providers have more pressure to ensure that their services are not only quick and convenient, but secure. With the amount of sensitive data passing through the many different connections that MaaS requires, secure fleet management systems are essential.

AutoCrypt FMS brings secure machine-learning, AI-based fleet management to MaaS platforms.

Page 31: a Mobility Security Company

Confidential – Subject to NDA 31

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Data collection

Data Access

Data classification Data processing Data transfer

Data collection Secure storage in cloud server

Data classification and processing

Data transferto service provider

MobilityService Provider

Data

Real time management and data analysis Fleet ManagementSystem

By analyzing the data from the mobility services (like taxi, ride-sharing, car-sharing), the FMS can classify, process and analyze the data, allowing for improvement in existing services and pinpointing new business opportunities.

(AUTOCRYPT MDC1-O2B)

Data from the vehicles are collected with AUTOCRYPT’s proprietary technology, MDC1-O2B.

Page 32: a Mobility Security Company

Confidential – Subject to NDA 32

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

The data is organized and placed into an easily managed, customized platform for secure fleet management.

From data collection to platform development, AutoCrypt FMS is a fully managed service.

Page 33: a Mobility Security Company

Confidential – Subject to NDA 33

For its mobility operators, AUTOCRYPT provides customized mobile application development for both the driver and the passenger.

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Use Cases with Fleet Management Platforms

Macaron Echo

Electric vehicle data platform

2U

Demand Responsive Transport (DRT) forthose with mobility challenges

Macaron Namu / iMom

Taxi service for pregnant mothers / mothers with toddlers / infants

Page 34: a Mobility Security Company

Confidential – Subject to NDA 34

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

2019 Best Automotive Cybersecurity Product/ Service

Best Auto CybersecurityProduct/ Service

Penta Security System - AutoCrypt

• AutoCrypt

2020 The Automotive Tech Company of the Year Finalist

Awards & Recognition

Page 35: a Mobility Security Company

Confidential – Subject to NDA 35

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Awards & Recognition

2020 Cybersecurity Company of the Year2020 Global Cyber Achievement Award

2020 Emerging AI+X Top 100 Companies(Mobility Category)

Page 36: a Mobility Security Company

Confidential – Subject to NDA 36

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

EU

• Volkswagen

• Renault-Nissan

• FCA

• PSA

• BMW

• Volkswagen

• Renault-Nissan

• Escrypt

• Nexus Group

• Wejo

Top 10 Largest Automakers

Top 10 Largest EV Makers

Cybersecurity Companies

North America

• GM

• Ford

• Tesla

• Karamba Security

• ARXAN

• Mocana

• TowerSec

• OnBoard Security

• Blackberry

• GHS ISS

Middle East

• Argus Cybersecurity

• Arilou Technologies

ASIA-PACIFIC

• Toyota

• Hyundai-Kia

• Honda

• BAIC

• BYD

• Hyundai-Kia

• SAIC

• Changan

• Geely

• Chery

• AUTOCRYPT

AUTOCRYPT is the only automotive cybersecurity provider in Asia-Pacific

Global Presence

Page 37: a Mobility Security Company

Confidential – Subject to NDA 37

Europe China

• OmniAir Cyber Security Working Group• Plugfest Security Test Station Provider• ISO 15118 Test Symposium Plug&Charge

Testing Provider• Auto-ISAC Member

North AmericaKorea

• PKI Provider for all 5 C-ITS Pilot Projects• Lead Automotive Cyber Security Consultant• ITS Korea Member• K-Plugtest Security Test Station Provider• KoChat Working Group

• Automotive & Testbed Security Consultant• Business Operations with local OEMs & Tier 1s• IMT2020 Member (PanQi Partnership)

• Plugtest Security Test Station Provider• CharIn Testival Plug&Charge Testing Provider• ISO 15118 PKI Interoperability Round Table

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

Compliance / Testing worldwide

Global Presence

Page 38: a Mobility Security Company

Confidential – Subject to NDA 38

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

上海磐起信息科技有限公司

Shanghai PanQi Information Technology Through a joint-venture with PanQi, AUTOCRYPT has two branch offices in China, in Shanghai and the smartmobility-focused city of Wuxi.

S H A N G H A IW U X I China Smart Road Construction

• 23 smart road demonstration complexes

• Security to be implemented starting November 2020

• Wuxi PanQi selected for municipal business support

• Current business developments and sales in 4 regions (WUXI, CHANGSHA, WUHAN, BEIJING)

Global Presence

Business in China

Page 39: a Mobility Security Company

Confidential – Subject to NDA 39

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

100 54%TESTING COMPLETE

WITH ALL V2X STACK COMPANIES

PARTNERS ANDCUSTOMERS WORLDWIDE

20PATENTS FILEDDOMESTICALLYAND GLOBALLY

>

Global Presence

Partners, Customers, Consortiums

Page 40: a Mobility Security Company

Confidential – Subject to NDA 40

ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION

As the industry continues to develop

will also grow and evolve

2019 - 2020

Automotivesecurity

2021 - 2022

AutonomousVehicle Security

2023 - 2024

MobilitySecurity

Page 41: a Mobility Security Company

SEOUL ∙ SEJONG ∙ SHANGHAI ∙ WUXI ∙ TORONTO ∙ TOKYO

www.autocrypt.io