a mobility security company
TRANSCRIPT
The Automotive Tech Company of the Year Finalist 2020
Best Auto CybersecurityProduct/Service 2019
2020 Global Cyber Achievement Award
2020 Automotive Cybersecurity Company of the Year
Artificial Intelligence Industry Association2020 Emerging AI+X Top 100 CompanyMobility Category
Copyright by AUTOCRYPT Co., Ltd. All rights reserved.
a Mobility Security Companyfor Autonomous, Connected Vehicles, and Beyond
Confidential – Subject to NDA
Is the leading security solutions providerfor autonomous vehicles
–As vehicles become increasingly connected, automated, and shared, cybersecurity for these connections becomes that much moreessential in the rapidly-evolving framework of Smart Mobility. AUTOCRYPT, backed by decades of industry expertise and know-how,
meets the challenge of protecting the future of Autonomous Vehicles and Smart Mobility.
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
2
Confidential – Subject to NDA 3
Company Name
CEO
Established
# of Employees
Location
Business Areas
Core Members
AUTOCRYPT Co., Ltd.
Daniel Eui-seok Kim
August 23, 2019
70 (50 Development / Engineering) as of May 2020
Yeoido, Seoul, Republic of Korea
|
|
|
|
|
| 1 - V2X Security: Secure V2X-based communications and autonomous vehicle security2 - IVS Security: In-vehicle security for protection against hacking / abnormal behavior3 - V2G Security: EV charging & authentication4 - V2D Security: Digital Key, passenger authentication5 - FMS: Fleet Management System and platform development
CEO, co-Founder
Daniel ES Kim–
COO, co-Founder
Duksoo Kim–
CTO, co-Founder
SangGyoo Sim–
CSO
Jaeson Yoo–
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 4
History
M Development of automotive safety diagnostic device
Authentication and encryption enhanced solution for vehicle/smart device sync connection
GPS / Telematics authentication and encryptions systems integration for police patrol vehicles
Development of IEEE1609.2-based V2X security solution for WAVE
Development of Vehicle Data Management System (VDMS) for automotive big data processing
Security verification technology developed for telematics smartphone application
G
Installation and operation of Daejeon-Sejong C-ITS security system
Installation and operation of Yeoju autonomous driving security system
Installation and operation of Hwaseong K-City autonomous driving testbed security system
Development of security system for railway transport system
Development of security solution for Electric Vehicle (EV) charging system
Design of secure authentication system for Korean Expressway Corporation C-ITS project
Installation of Jeju province C-ITS security system
Development of vehicle/smartphone connection authentication security system for Samsung Electronics
Deep learning-based abnormal behavior detection function added for AutoCrypt AFW, in-vehicle hacking prevention solution
20072011
2012
2013
2014
Official commercial launch of AutoCrypt®, Smart Car Security Solution20152016
2017
2018
AUTOCRYPT Co., Ltd. established, spinoff from Penta Security Systems2019
Development of ISO15118-standard EV Plug&Charge security solution
M
M
M
M
M
G
M
G
G
G
M
G
G
M
M
1997 Penta Security Systems established with PKI-based security technology
2007 Penta Security launches automotive cybersecurity business, overseeing over 15 security projects with major automotive manufacturers for in-vehicle and external security
2015 Official commercial launch of AutoCrypt®
smart car security product
2016 Takes domestic contract for installation and operation of all smart road C-ITS projects in South Korea
2019 Spinoff of Penta Security as independent venture, AUTOCRYPT
Government / Public Institution projects
Automotive manufacturer / supplier projects
G
M
HIGHLIGHTS
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 5
History
1997 Penta Security Systems established with PKI-based security technology
2007 Penta Security launches automotive cybersecurity business, overseeing over 15 security projects with major automotive manufacturers for in-vehicle and external security
2015 Official commercial launch of AutoCrypt®
smart car security product
2016 Takes domestic contract for installation and operation of all smart road C-ITS projects in South Korea
2019 Spinoff of Penta Security as independent venture, AUTOCRYPT
Government / Public Institution projects
Automotive manufacturer / supplier projects
G
M
HIGHLIGHTS
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
AUTOCRYPT Co., Ltd. established, spinoff from Penta Security Systems
Installation and operation of Gwangju C-ITS project security system
Certification for C-V2X compatibility supporting C-SCMS standards by CAICT under IMT-2020(5G)
G
2019Contract won for Korean Expressway Corporation V2X-SCMS implementation project
Development of In-Vehicle Infotainment (IVI) security solution
G
M
M Development of automotive safety diagnostic device
2020 Official membership into Car Connectivity Consortium (CCC) and submission of Digital Key PoC
Installation and operation of Ulsan C-ITS project security systemG
Development of PnC security system for OEM company’s rapid charge systemM
Confidential – Subject to NDA 6
Why autonomous vehicles?Why security?
–
Limitations of Sensors Hacking Vulnerabilities
At Level 3 Autonomy, the autonomous vehicle industry is at a standstill because of the
issues of development for sensor technology.
There are still driving situations that cannot be detected with sensors. Furthermore, sensors are unab
le to interpret intent of vehicles.
Risk to Human Life
In traditional IT security, breach could lead to loss of access, financial assets, or even
personal information resulting in identity theft.
However, when iit comes to automotive security, it is literally the lives of drivers, passengers, and even pe
destrians at risk.
Human life must be prioritized.
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
The reality is that this new world of connected and autonomous vehicles opens up channels of possibilities when it comes to hacking and
data breach.
In-vehicle, manufacturer OT, and even backend IT systems are at risk.
Confidential – Subject to NDA 7
We are committed to ensure that the connected and autonomous vehicle experiencecan be trusted by drivers and passengers on and off the road, keeping everyone involved safe from harm.
C-level with average of 20 yearsExperience in cybersecurity
and automotive security
80% of employees dedicatedto innovation, research,
and development.
Security lead for all C-ITSprojects in South Korea,over 5000km covered
Globally recognized acrossKorea, Japan,
the United States, and China
AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 8
We are committed to ensure that the connected and autonomous vehicle experiencecan be trusted by drivers and passengers on and off the road, keeping everyone involved safe from harm.
With decades of experience in automotive cybersecurity, AUTOCRYPT’s security expertsprovide comprehensive solutions, end-to-end.
VehiclesTrafficsignals
RSUs Mobiledevices
Pedestrians
Roads
VB
Mobiledevice
Cloud Internet
Telecom provider network
TELEMATICS IVSSecurity
V2XSecurity
V2G SecurityV2D Security
Driver Mobiledevice
Vehicleowner
Charger Chargepoint
Grid
AUTONOMOUS VEHICLE SECURITY
B
FMS
MOBILITY SECURITY
MOBILITY SECURITY
MOBILITY SECURITY
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 9
End-to-end automotive security
IVS Security(In-vehicle Systems)
IN-VEHICLE VEHICLE + VICINITY OUTSIDE VEHICLE
AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY
FMS(Fleet Management
System)
V2D SecurityV2G SecurityV2X Security
ECU security development
Security consulting
Intrusion Detection and Prevention Systems
Mobile device
Pedestrians
Vehicles
Road
Traffic signals
Roadside units(RSUs)
Charger
Charge point
Grid
Driver
Mobile device
Vehicle owner
Digital key
Managed services
Mobility data collection
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 10
VehiclesTrafficsignals
RSUs Mobiledevices
Pedestrians
Roads
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
V2X (Vehicle-to-Everything)
allows the vehicle to communicate with other entitiesto ensure safe, efficient autonomous vehicle operation.
V2V: Vehicle-to-VehicleV2I: Vehicle-to-Infrastructure
V2P: Vehicle-to-PedestrianV2N: Vehicle-to-Network
Confidential – Subject to NDA 11
V2X ensures that not only is traffic control optimized,
but that autonomous vehicles operate securely for the vehicles themselves as well as their surroundings
Non line-of-sight awareness Conveying Intent Situational Awareness
360* awareness, eliminating blind spots. Works at nightas well as inclimate weather conditions.
Vehicles can convey intent, share data and path planning for higher levels of predictability.
Increased electronic horizon to support soft safety alertsand graduated warning.
Sudden lanechange
Reduced speedahead
Queue warning / shockwave damping
Blind intersection / vulnerable road user(VRU) alerts
* Original source: Qualcomm Roadmap
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 12
While V2X allows for communications with many different entities,without security, V2X cannot be properly implemented
* WAVE : Wireless Access in Vehicular Environments, Wi-Fi based communications extended up to 1km while driving at 200km/h
** C-V2X : Cellular V2x, 5G-based V2X communications
V2X(Autonomous Vehicle Communications)
WAVE*
C-V2X**= + Security
Comprehensive V2X security solution with fully customizable integration
B
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 13
B
VehiclePedestrian
mobile deviceRoadside units
(RSUs)Edge Cloud Central Cloud Big data
V2X-EEV V2X-EEM V2X-EER V2X-EEE V2X-PKI V2X-MBD
V2X authentication / electronic signature / encryption / anonymization / key managementV2X key generation
/ authenticationV2X anomaly / threat
detection
Use cases in application for automotive ECU, embedded, mobile, and virtual environments
IEEE 1609.2 standard compliant
CAMP VSC5 (SCMS v1.2) standard compliant
*
AutoCrypt V2X provides security solution for all components participatingin V2X communications, compliant with the latest standards.
* EEV: End-Entity for Vehicle, EEM: End-Entity for Mobile, EER: End-Entity for Roadside Unit,EEE: End-Entity for Edge Cloud MBD: Mis-Behavior Detection
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 14
V2X verification speeds of 2500/s, twice as fast as industry standardand 30% faster than competitors
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Largest number of C-ITS implementationprojects with practical operation
China SCMS (C-SCMS)standard compliant
Top 5 V2X Security Companies
• ESCRYPT • On Board Security• Autotalks• AutoCrypt• Green Hills Software
-Source : V2X Cybersecurity MarketGlobal Forecast to 2025, Markets and Markets
Confidential – Subject to NDA 15
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Use Case with C-ITS V2X Security Project
AUTOCRYPT was selected to begin implementing security into Korea’s smart roads in 2016, as part of Penta Security.
In the past five years, AUTOCRYPT has consistently won contracts for KEC’s C-ITS projects, giving AUTOCRYPT complete security oversight of thenation’s smart road V2X capabilities.
S E O U LY E O J U
S E J O N G
H W A S E O N G
J E J U
U L S A N
G W A N G J UH W A S E O N G K - C I T Y
One of AUTOCRYPT’s largest projects withKEC was K-City, Korea’s largest autonomousvehicle testing facility. K-City is the firstever testbed of its kind in Korea, and the second-largest in the world.
Confidential – Subject to NDA 16
A vehicle’s internal system is complex,consisting of a large number of ECUs,(Electronic Control Units), which control aspects of the vehicle like the engine, brake control, and internal communication.
The ECUs are enabled by the CAN (Controller Area Network) and MOST (Media Oriented Systems Transport) bus.
Car body
Chassis
Engine
Network
Infotainment
Diagnostics& Maintenance
OBU
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 17
With infiltration of the network, a hacker could access all the car’s major functions through the various ECUs by altering the data, corrupting operation through illicit message delivery, finding critical data storage.
This puts the driver, passengers, and those around the vehicle at risk.
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
In-VehicleInfotainment
ensures that the internal system of the vehicle is securedfrom end-to-end.
Confidential – Subject to NDA 18
Security reinforcement and monitoring for ECUsAbnormal behavior / attack detection for internal
and external communication networks
Firewall
Encryption
Secure Storage
Secure Booting
Monitoring
Integrity
Access Control
OS Hardening
GatewayCore
IDS CoreStored in server
CAN Bus
CANMessage
Detected Message
forwarding logging
IVS-ECU IVS-IDS
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 19
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Total security with AutoCrypt IVS
Gateway
ECU
ECU
Internal network
External network
ECU
- Encryption Library- Secure booting
& Remote authentication
- Secure updates- HW trust anchor
- Message authentication, confidentiality & integrity- Key management
- Traffic flow control- Abnormal traffic detection- PII and data protection
- Network security
Customized solution with third-party providers
By analyzing and detecting abnormalbehavior and communications occurring within the vehicle’s internal network, along with incorporation of Firewall and IDS, AutoCrypt IVS secures the ECUs and provides the necessarysecurity modules to allow for safe operation of the vehicle.
Confidential – Subject to NDA 20
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Use Case with WP.29 Regulation Compliance
Because WP.29’s regulations are binding for the contracted parties, those that do not comply may face trade issues and challenges in brand imaging and long-term business relationships.
AUTOCRYPT provides consulting and solution review with manufacturers, suppliers, and service providers affected by the regulations.
In June 2020, the UNECE WP.29 GRVA working party announced a new set of regulations requiring comprehensive cybersecurity systems to be implemented into all new vehicle
models after July 2022.
Consulting
AutoCrypt IVS
Testing
IVS-ECU
IVS-IDS
Confidential – Subject to NDA 21
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
ICEInternational Combustion Engine
HEVHybrid Electric Vehicle
BEVBattery Electric Vehicle
Electric Vehicles (EVs) can include hybrid vehicles (which utilize both a traditional combustion engine as well
as a battery-powered motor), Hydrogen fuel-cell vehicles (using a chemical reaction to power an electric motor), plug-in hybrids, and battery electric vehicles. All three utilize electricity for operation, but only BEVs rely on solely electricity and can charge on a level 3, DC fast charge.
E L E C T R I C V E H I C L E S
PHEVPlug-in Hybrid Electric Vehicle
FCEVFuel Cell Electric Vehicle
Confidential – Subject to NDA 22
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
2015 2019
Korea 3,025 30,819
Japan 10,388 26,627
USA 73,715 250,453
China 135,507 721,088
0
400,000
800,000
1,200,000
Sales and ownership of EVs have been increasing in number as more drivers seek a more environmentally-friendly, economical method of transportation. The number of charge points has also increased exponentially.
Korea : 29,309
Japan : 40,018
China : 1,001,420USA : 63,303
Annual EV Sales (2015 – 2019) Total # of Charge Stations
Confidential – Subject to NDA 23
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
EVs still require security...
A charger for an EV acts not only as a line of electric charge, but also a line of communication. Sending software patches, diagnostics, data transfers, along with power charge, the charger is the main line of communication.
Chargers also send along payment and personal information, requiring security protocols to be in place.
Confidential – Subject to NDA 24
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Vehicle owner
Automobilemanufacturer
ISO 15118 OCPP
Vehicle
Mobility Operator (MO)
EVSE manufacturers
ChargersCharge points
Charge servicemanagement
ElectricityProvider
Charge pointmanufactuers
ISO 15118: International Standard Road vehicles – Vehicle to grid communication interface
OCPP: Open Charge Point Protocol
secures the Plug&Charge (PnC) system.
Plug&Charge is a secure, convenient way of charging EVs. The driver can plug the charging cable into the EV and the EV will automatically identif
y itself and be authorized to receive charge. Additional services can include automatic payment, charge roaming, and even bidirectional charging.
Confidential – Subject to NDA 25
Electric Vehicle Charge PointMobility
Operator (MO)Electricity Provider
V2G-EEV V2G-PKI V2G-PKI V2G-PKI
V2G key management, mutual authentication
V2G contractcertificate issuance
ISO 15118 compliant
OCPP 2.0 compatible
V2G-EEC *
Providing interoperability and mutual authentication withtop-level V2G certification authorities
* EEC: End-Entity for Charger
V2G key generation/ authentication
TLS authentication / rncryption
Charge PointOperator (CPO)
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Confidential – Subject to NDA 26
Hubject & Penta Security provide SaaS service with cross-certification for ISO 15118 complianceBoth are V2G Root CAs, allowing for global use of existing secure solutions with no lock-in effect.
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Use Case with ISO 15118
Hubject and Penta Security Cooperate to Provide First Global Cross Certification for Most Secure ISO 15118 based EV Charging
Hubject and Penta Security today announced their co-operation to enable standardized secure communication between electric vehicles and charging stations. The international standard ISO 15118 is mostly known for the application of the mostsecure, automated and seamless charging and payment processes for electric vehicles, Plug&Charge.
Confidential – Subject to NDA 27
AUTOCRYPT created a digital key to allow drivers to have a more convenient driving experience, utilizing their phone in place of
a physical key.
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
V2D (Vehicle-to-Device)
allows for communication between the vehicle and anelectronic device.
More and more people look for a seamless driving experience without the limitations of a physical key for access.
Confidential – Subject to NDA 28
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
With digital keys, secure interoperability is essential, which is why AUTOCRYPT’s Digital Key follows the Car Connectivity Consortium (CCC) Digital Key 2.0 Release standards, and is already in development to be compliant with 3.0 standards when updated.
As the first cybersecurity company in Asia-Pacific to become an official member of the CCC, AUTOCRYPT joins the ranks of major global mobile and vehicle manufacturers in ensuring the convenience and security of digital keys.
.
.
.
Confidential – Subject to NDA 29
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Vehicle Access & Control
Remotely access and control the vehicle through the Digital Key as the owner or as a shared key holder. Additional functions like starting the engine and sounding the horn are also available.
Digital Key Registration & Sharing
Register the vehicle onto the AUTOCRYPT Digital Key application to install the digital key. The digital key can then be shared with multiple people through password and invite link.
Secure Usage Restrictions & Settings
Owner can fine-tune the range of functions like duration of access, engine control, maximum speed. Owners can modify permissions, opt out of sharing, or extend sharing at their discretion.
Use Case with AUTOCRYPT Digital Key
Confidential – Subject to NDA 30
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
The rise of connectivity has brought mobility to the forefront, and with it has brought Mobility-as-a-Service business models.
As an on-demand service, MaaS providers have more pressure to ensure that their services are not only quick and convenient, but secure. With the amount of sensitive data passing through the many different connections that MaaS requires, secure fleet management systems are essential.
AutoCrypt FMS brings secure machine-learning, AI-based fleet management to MaaS platforms.
Confidential – Subject to NDA 31
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Data collection
Data Access
Data classification Data processing Data transfer
Data collection Secure storage in cloud server
Data classification and processing
Data transferto service provider
MobilityService Provider
Data
Real time management and data analysis Fleet ManagementSystem
By analyzing the data from the mobility services (like taxi, ride-sharing, car-sharing), the FMS can classify, process and analyze the data, allowing for improvement in existing services and pinpointing new business opportunities.
(AUTOCRYPT MDC1-O2B)
Data from the vehicles are collected with AUTOCRYPT’s proprietary technology, MDC1-O2B.
Confidential – Subject to NDA 32
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
The data is organized and placed into an easily managed, customized platform for secure fleet management.
From data collection to platform development, AutoCrypt FMS is a fully managed service.
Confidential – Subject to NDA 33
For its mobility operators, AUTOCRYPT provides customized mobile application development for both the driver and the passenger.
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Use Cases with Fleet Management Platforms
Macaron Echo
Electric vehicle data platform
2U
Demand Responsive Transport (DRT) forthose with mobility challenges
Macaron Namu / iMom
Taxi service for pregnant mothers / mothers with toddlers / infants
Confidential – Subject to NDA 34
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
2019 Best Automotive Cybersecurity Product/ Service
Best Auto CybersecurityProduct/ Service
Penta Security System - AutoCrypt
• AutoCrypt
2020 The Automotive Tech Company of the Year Finalist
Awards & Recognition
Confidential – Subject to NDA 35
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Awards & Recognition
2020 Cybersecurity Company of the Year2020 Global Cyber Achievement Award
2020 Emerging AI+X Top 100 Companies(Mobility Category)
Confidential – Subject to NDA 36
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
EU
• Volkswagen
• Renault-Nissan
• FCA
• PSA
• BMW
• Volkswagen
• Renault-Nissan
• Escrypt
• Nexus Group
• Wejo
Top 10 Largest Automakers
Top 10 Largest EV Makers
Cybersecurity Companies
North America
• GM
• Ford
• Tesla
• Karamba Security
• ARXAN
• Mocana
• TowerSec
• OnBoard Security
• Blackberry
• GHS ISS
Middle East
• Argus Cybersecurity
• Arilou Technologies
ASIA-PACIFIC
• Toyota
• Hyundai-Kia
• Honda
• BAIC
• BYD
• Hyundai-Kia
• SAIC
• Changan
• Geely
• Chery
• AUTOCRYPT
AUTOCRYPT is the only automotive cybersecurity provider in Asia-Pacific
Global Presence
Confidential – Subject to NDA 37
Europe China
• OmniAir Cyber Security Working Group• Plugfest Security Test Station Provider• ISO 15118 Test Symposium Plug&Charge
Testing Provider• Auto-ISAC Member
North AmericaKorea
• PKI Provider for all 5 C-ITS Pilot Projects• Lead Automotive Cyber Security Consultant• ITS Korea Member• K-Plugtest Security Test Station Provider• KoChat Working Group
• Automotive & Testbed Security Consultant• Business Operations with local OEMs & Tier 1s• IMT2020 Member (PanQi Partnership)
• Plugtest Security Test Station Provider• CharIn Testival Plug&Charge Testing Provider• ISO 15118 PKI Interoperability Round Table
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
Compliance / Testing worldwide
Global Presence
Confidential – Subject to NDA 38
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
上海磐起信息科技有限公司
Shanghai PanQi Information Technology Through a joint-venture with PanQi, AUTOCRYPT has two branch offices in China, in Shanghai and the smartmobility-focused city of Wuxi.
S H A N G H A IW U X I China Smart Road Construction
• 23 smart road demonstration complexes
• Security to be implemented starting November 2020
• Wuxi PanQi selected for municipal business support
• Current business developments and sales in 4 regions (WUXI, CHANGSHA, WUHAN, BEIJING)
Global Presence
Business in China
Confidential – Subject to NDA 39
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
100 54%TESTING COMPLETE
WITH ALL V2X STACK COMPANIES
PARTNERS ANDCUSTOMERS WORLDWIDE
20PATENTS FILEDDOMESTICALLYAND GLOBALLY
>
Global Presence
Partners, Customers, Consortiums
Confidential – Subject to NDA 40
ABOUT AUTOCRYPT AUTONOMOUS VEHICLE SECURITY MOBILITY SECURITY GROWTH & EXPANSION
As the industry continues to develop
will also grow and evolve
2019 - 2020
Automotivesecurity
2021 - 2022
AutonomousVehicle Security
2023 - 2024
MobilitySecurity
SEOUL ∙ SEJONG ∙ SHANGHAI ∙ WUXI ∙ TORONTO ∙ TOKYO
www.autocrypt.io