Shanghai, China – November 18, 2021 – Lattice semiconductor Corporation (NASDAQ: LSCC), a leading provider of low-power programmable devices, today announced its latest roadmap for low-power, AI/ML solutions , these solutions can help network edge applications such as client computing devices extend battery life and bring innovative user experiences. Built with the award-winning collection of Lattice sensAITM solutions and running on Lattice Nexus® FPGAs, they help OEMs develop smart, real-time, low-power, hardware-accelerated AI-enabled devices that are field upgradeable , to support more AI algorithms in the future.
Client computing devices increasingly demand responsive and context-aware user experiences, high-quality video conferencing, and collaborative applications. The Lattice Nexus FPGA and sensAI solutions collection is an ideal platform for developing computer vision and sensor fusion applications that enhance user engagement and collaboration and protect user privacy. For example, the client device can analyze the image data captured by the camera to determine whether people behind you are too close to the user, and can also blur the screen to protect privacy when the user’s attention is shifted elsewhere, or dim the screen to prolong battery life.
“AI applications based on vision, sound and other sensors will revolutionize the client computing experience,” said Matt Dobrodziej, vice president of marketing and business development at Lattice. “Our sensAI supports a variety of network edge AI solutions that empower client devices with contextual awareness. , so they know when, where and how they are being used. Our Nexus FPGAs do this with industry-leading low power consumption.”
AI computing devices developed with sensAI and running on Lattice FPGAs have 28% longer battery life compared to devices that use CPUs to drive AI applications. sensAI also supports in-field software updates to keep AI algorithms evolving, and gives OEMs the flexibility to choose different sensor and SoC technologies to fit their devices.
Lattice is working with leading AI ecosystem partners to develop a roadmap for the development of the Lattice client computing AI experience.
“Our Glance by Mirametrix attention-sensing software captures the user’s face, eye and gaze movements to understand the user’s awareness and attention,” said Stephen Morganstein, vice president of Mirametrix. “This unique technology enables smart devices to provide a more natural and immersive user experiences and device interactions. Lattice’s collection of sensAI solutions and low-power FPGAs can help developers implement novel AI capabilities and improve device battery life.”
The latest version (v4.1) of the sensAI Solutions Collection is now available to support Lattice’s AI-based application roadmap with enhancements and new features including:
Client Computing AI Experience Reference Design
o User detection: Client devices are automatically powered on or off when a user approaches or leaves the device
o Attention Tracking: When the user’s attention is not on the screen, reduce the screen brightness of the device, save battery, and prolong the use time
o Face Framing: Enhances the video experience in video conferencing applications
o Bystander Detection: Detects potential peepers standing behind the device, blurring the screen for data privacy
More application support – The performance and accuracy improvements of sensAI version 4.1 help expand its target applications, including applications such as high-precision object detection and defect detection used in automated industrial systems. This collection of solutions features a new hardware platform, including an onboard image sensor, two I2S microphones, and expansion connectors for adding more sensors, enabling the development of voice and vision-based machine learning applications.
Easy-to-use tools – sensAI has also updated the neural network compiler to support Lattice sensAI Studio, a GUI-based tool with a library of AI models that can be configured and trained for various mainstream application scenarios. sensAI Studio now supports AutoML capabilities to create machine learning modules based on application and dataset goals. Some models based on Mobilenet’s machine learning inference training platform are optimized for the latest Nexus line of products, the Lattice CertusPro™-NX. sensAI is also compatible with other widely used machine learning platforms, including the latest versions of Caffe, Keras, TensorFlow, and TensorFlow Lite.
Beijing, China, March 17, 2021 – Adaptive computing leader Xilinx (NASDAQ: XLNX) today announced the market expansion of its UltraScale+ product portfolio to support new applications requiring ultra-compact and intelligent edge solutions. The new Artix® and Zynq® UltraScale+ devices offer a 70 percent smaller form factor than traditional chip packages, addressing a wider range of applications in the industrial, vision, medical, broadcast, consumer, automotive and connected markets.
As the world’s only 16nm technology-based hardware flexible cost-optimized portfolio, Artix and Zynq UltraScale+ devices feature TSMC’s most advanced InFO (Integrated Fan Out) packaging technology. With InFO technology, Artix and Zynq UltraScale+ devices address the demands of intelligent edge applications by delivering high compute density, excellent performance per watt, and scalability in a compact package.
Sumit Shah, senior director of product line management and marketing at Xilinx, said: “The need for compact intelligent edge applications is driving up the need for processing and bandwidth engines. These engines must not only provide higher performance, but also higher levels of Compute density to support the smallest form factor systems. The UltraScale+ family is powered by new cost-optimized products. It is based on the Xilinx UltraScale+ FPGA and MPSoC architectures and production-proven technologies that have long worked together Deployed in millions of systems around the world.”
Artix UltraScale+ FPGAs: Built for High I/O Bandwidth and DSP Computing
Based on a production-proven FPGA architecture, the Artix UltraScale+ family is ideal for a range of applications such as machine vision with advanced sensor technology, high-speed interconnect, and ultra-compact “8K-ready” video broadcasting. Artix UltraScale+ devices provide 16Gb-per-second transceivers to support emerging high-end protocols in the interconnect, vision and video domains, while enabling best-in-class DSP computing capabilities.
Figure: Xilinx Artix UltraScale+ FPGAs for High I/O Bandwidth and DSP Computing
Zynq UltraScale+ MPSoC: Optimized for Power and Cost
The cost-optimized Zynq UltraScale+ MPSoC includes the new ZU1 and production-proven ZU2 and ZU3 devices, all in InFO packages. Part of the Zynq UltraScale+ family of multiprocessing SoCs, the ZU1 is designed for edge connectivity and industrial and medical IoT systems, including embedded vision cameras, AV-over-IP 4K and 8K-ready streaming, handheld test equipment, and Consumer and medical applications, etc. The ZU1 is built for small, compute-intensive applications and features a multi-core processor subsystem based on heterogeneous Arm® processors, while migrating to common package sizes to support higher computing power.
Figure: Xilinx Zynq UltraScale+ MPSoC optimized for power and cost
“LUCID has worked closely with Xilinx to integrate the new UltraScale+ ZU3 into our next-generation industrial machine vision camera, the Triton™ Edge,” said Rod Barman, founder and president of LUCID Vision Labs. “With the UltraScale+ ZU3 and its InFO package, LUCID is able to leverage the The innovative rigid-flex board architecture packs incredible processing power into a factory-grade rugged, ultra-compact IP67 camera.”
Scalable and secure Artix and Zynq UltraScale+
With the addition of the new Artix devices and the expansion of the Zynq UltraScale+ family, Xilinx’s product portfolio now spans from the Virtex® UltraScale+ high-end family, the Kintex® UltraScale+ mid-range family to the new cost-optimized low-end family. The introduction of the new devices complements Xilinx’s product portfolio and provides customers with the scalability to develop multiple solutions using the same Xilinx platform. This preserves design investment across different product portfolios and accelerates time-to-market.
Security is a critical component in Xilinx’s design. The new devices in the cost-optimized Artix and Zynq UltraScale+ families have the same robust security features as the UltraScale+ platform, including RSA-4096 authentication, AES-CGM decryption, Data Protection Act (DPA), and Xilinx proprietary The Security Monitor (SecMon, security monitoring) IP can flexibly respond to security threats in the product life cycle and meet various security needs of commercial projects.
Dan Mandell, Senior Analyst, IoT and Embedded Technologies, VDC Research, said: “The ability for customers to scale their designs to accommodate a wide range of applications and market needs with a single and secure platform is critical for easier design integration and control. Time-to-market opportunities are critical. Xilinx’s strategy to expand its product portfolio to address these market needs with the scalable and secure UltraScale+ Artix and Zynq families is attractive, especially given the There are huge opportunities in growth markets.”
The first cost-optimized Artix UltraScale+ devices are expected to be in production in the third quarter of 2021, with support for the Vivado® Design Suite and VitisTM unified software platform tools beginning in late summer. Tooling support for the Zynq UltraScale+ ZU1 device will be available in the second quarter, with samples available in the third quarter; mass production of the broad product portfolio will begin in the fourth quarter.
There is no doubt that in the post-epidemic era, changes in patient health monitoring methods and changes in face-to-face medical consultation services will create greater demand for personal and wearable medical devices. And this change in terminal demand will inevitably lead to a new round of market demand for safer, high-capacity non-volatile storage products to meet the needs of wearable devices to store more user data, more reasonable cost per unit, and at the same time The need for higher security performance.
Personal Medical Devices Implicit Hazard of Intrusion or Attack
For the foreseeable future, people in many countries will continue to observe social distancing mandates in indoor spaces. Schools, factories and hospitals must find ways to reduce indoor gatherings to maintain safe social distancing. As a result, healthcare systems must prioritize technologies that enable monitoring and diagnosis outside the hospital so that patients do not have to physically visit the hospital for observation.
Wearable health tracking devices provide people with a new way of life that enables them to maintain healthier habits and enhance their ability to fight disease. Now, most people are already familiar with wearable health tracking devices, such as user heart rate monitoring. Winbond predicts that the proportion of medical personnel using wearable devices to treat various diseases will increase rapidly in the future. In the post-epidemic era, professional wearable medical devices and consumer wearable medical devices are likely to become the new darlings of the market.
However, the number of users of wearable medical technology has grown significantly, but it has also brought related security risks:
Professional medical equipment has extremely high safety features in some use cases – the life of the user is at stake. Therefore, these devices must be able to withstand malicious attacks such as distributed denial of service attacks, so as not to interrupt or paralyze the operation of the device.
The wearable device records the user’s private data and transmits it to a host device such as a smartphone, mostly via a wireless network such as a Bluetooth low energy radio. Importantly, the user must be able to trust that their device will only provide data to authorized parties, such as the user’s doctor.
There are real risks in using connected wearables, and official agencies such as the U.S. Food and Drug Administration (FDA) have issued a series of warnings asking device users and manufacturers to be aware of known risks, such as the SweynTooth that affects Bluetooth low energy radio chipsets A series of network security vulnerabilities. In March of this year, the FDA said in an announcement about SweynTooth that “software exploiting these vulnerabilities has been publicly available under certain circumstances.” Medical devices are most at risk when they transmit data or program code: for example, when a wearable heart rate monitor uploads heart rate measurements to the user’s smartphone via Bluetooth low energy connectivity; or when wirelessly from the cloud When the network delivers updated firmware to the wearable device.
For simple wearable products, the construction of security measures is mostly limited to a microcontroller or system-on-chip (SoC), which has a small flash memory area built into the chip to store the security program code. But for more sophisticated devices, because the program code capacity is too large, which exceeds the memory capacity of the embedded MCU, an external flash memory is required to store the program code.
But this type of external memory can become a security hole if it lacks security features such as a cryptographic engine and a root of trust. If the external memory is at risk, no matter how secure the host MCU or SoC is, the entire device and the data in it will be compromised. Winbond’s latest secure memory product in its TrustME™ series, the W77Q, protects devices from remote software attacks and ensures secure and reliable end-to-end security for connected medical devices.
TrustME®W77Q mainly solves potential security problems through the following functions:
Secure program code updates, including over-the-air updates via an end-to-end encrypted channel between the update authority and the W77Q, even in the event of a compromised host MCU or SoC;
Secure Boot and Root of Trust
Authenticated and encrypted data transfer between flash device and host
On-chip execution of boot and application code (XiP, Execute-in-Place)
System resilience, enabling key security features such as protection, detection and recovery.
How to optimize the cost of storing large amounts of personal data
The use of wearables and home patient monitoring devices can relieve pressure on healthcare facilities and assist clinics and hospitals in maintaining safe social distancing. However, these personal devices generate large amounts of profile data. Monitoring devices with built-in multiple sensors are already available on the market. These devices can simultaneously track various vital signs, such as heart rate, heart rate variability, blood oxygen concentration and temperature. Since wearable devices cannot be continuously connected to the Internet, their system architecture must be able to store user data locally, so high-capacity non-volatile memory is required. In addition, the diagnosis and treatment of patients need to be judged with this data, so data integrity is also one of the mission-critical requirements.
The traditional memory type used for non-volatile, zero-error data storage devices is NOR Flash, which is a cost-effective choice for low-density applications below 512Mbit. But when the required data capacity reaches more than 512Mbit, the NAND Flash process has more advantages. In Winbond’s medical device market outlook, NOR Flash for storing user data needs a high-reliability, high-speed alternative. To this end, Winbond has developed a new technology to improve the read and write performance of its SLC NAND Flash products.
For example, the W25N QspiNAND series offers capacity options of 512Mbit, 1Gbit, 2Gbit and 4Gbit, and shares the same interface as traditional SPI NOR Flash, allowing for easy and fast replacement in existing designs, with a lower cost per unit for 512Mbit capacity , using less board space. The W25N device also has fast program/erase performance and is reliable and stable: the product includes more than 100,000 program/erase cycles and a data retention period of over 10 years. The built-in Error Correction Code (ECC) engine ensures that the data in the storage space is free from bit errors.
In addition, Winbond also provides a higher-performance migration path for medical devices that integrate a large number of sensors and operate at high sampling speed: high-performance QspiNAND Flash and OctalNAND Flash products provide the same high-level reliability as SLC NAND Flash quality, And the data bandwidth is even higher.
A new generation of personal medical devices
The impact of the new crown epidemic is still ongoing, but it is clear that the medical industry is bound to use more personal and wearable technology devices. Among them, data is the key to these emerging personal medical devices, and also has a large impact on the design of security and storage systems. The wearable medical technology market is changing with each passing day. Winbond’s secure NOR Flash products and high-reliability, high-capacity QspiNAND Flash have taken the lead in the development. OEMs can trust Winbond and continue to use its new product types and technologies to meet the needs of The latest market demands for secure, low-cost program code and data storage.
Bosch now offers hydrogen tank valves and pressure reducing valves for hydrogen storage tanks
Bosch will cooperate with OMB Saleri for in-depth product development to achieve mass production
Bosch predicts that by 2030, one in eight new commercial vehicles will be fuel cell vehicles
Bosch, the world’s leading technology and service provider, is further expanding its product portfolio for hydrogen fuel applications in vehicles, and can now provide components for hydrogen storage tanks, such as hydrogen tank valves and pressure reducing valves. To this end, Bosch has established cooperation with Italian professional manufacturer OMB Saleri to carry out in-depth product research and development. “Hydrogen will be an important part of future hybrid powertrains in order to achieve climate neutrality,” said Dr. Uwe Gackstatter, President of Bosch’s Powertrain Solutions business unit. The goal of mass production of tank parts is progressing.”
Hydrogen refueling solutions for global markets
In the next few years, hydrogen fuel powertrain demand will continue to grow strongly, especially in the commercial vehicle segment. Bosch predicts that by 2030, about one in eight newly registered commercial vehicles worldwide will be fuel cell vehicles. Bosch and OMB Saleri have established a cooperative relationship on hydrogen fuel supply system components, hoping to increase the market share of both parties in the hydrogen fuel field. The partners have signed licensing and engineering agreements covering several products for 350 bar and 700 bar pressure hydrogen storage solutions. The combined engineering team is deeply developing and optimizing existing products for mass production. The parties hope to leverage economies of scale to provide solutions for hydrogen refueling at competitive component prices.
Bosch and OMB Saleri join forces
The cooperation between Bosch and OMB Saleri brings together the expertise of both parties. OMB Saleri is an Italian technology company headquartered in the northern Italian city of Brescia. OMB Saleri is one of the world’s leading specialists in the field of components for hydrogen storage solutions. As a partner, Bosch will share its expertise – state-of-the-art hydrogen testing facilities and test stations, as well as components that have already received value-proven in preliminary applications. At the same time, Bosch will also share its successful experience in commercializing innovative products and its global R&D and manufacturing network for mass production.
Bosch is developing stationary and automotive fuel cell solutions
Bosch believes that hydrogen is an energy carrier with unlimited prospects and has made significant up-front investments in this area. Between 2021 and 2024, Bosch plans to invest around 600 million euros in automotive fuel cells and 400 million euros in stationary fuel cells for power generation and heating. In the field of automotive fuel cells, Bosch’s products cover from a single sensor to core components, such as Electronic air compressors and stacks, as well as a complete set of fuel cell power modules.
Bosch manufactures and sells auto parts and aftermarket products, industrial drive and control technology, power tools, security and communication systems, thermal technology and household appliances in China. Bosch entered the Chinese market in 1909. Bosch’s consolidated sales in 2020 reached 117.3 billion yuan. As of December 31, 2020, the company has more than 53,000 employees in China.
TOKYO, Japan, September 8, 2021 – Renesas Electronics Group (TSE: 6723), a global supplier of semiconductor solutions, today announced the launch of the RX671, a 32-bit microcontroller (MCU), adding a new addition to the popular RX product family. A new high-performance, multi-functional, single-chip solution with touch-sensing and non-contact operation such as voice recognition. Part of Renesas’ popular mainstream RX600 series, the RX671 MCU is built on the RXv3 CPU core, running at 120MHz, with integrated flash memory supporting fast 60MHz read access for excellent real-time performance with a CoreMark score of 707; power efficiency of 48.8 CoreMark/mA, among the best among similar products.
The RX671 MCU is available in a variety of packages ranging from 48 to 145 pin counts, with up to 2MB of Flash and 384KB of SRAM, making it ideal for applications requiring advanced features, high energy efficiency and compact size, such as heating, ventilation and air conditioning (HVAC), Smart meters and smart home appliances, etc. For size-constrained devices requiring advanced features, the RX671 is available in a 2MB flash, 4.5mm × 4.5mm ultra-small 64-pin TFBGA package.
The COVID-19 pandemic has created new demands on health and safety, and it has also changed the way people interact with devices and the environment, especially for more hygienic contactless user interfaces. Optimized for contactless applications, the new RX671 MCU integrates a capacitive touch sensing unit with high sensitivity and excellent noise tolerance to enable contactless proximity switches. In addition, the serial audio interface can be used to connect a digital microphone that supports long-range speech recognition. These functions, combined with speech recognition middleware from Renesas RX ecosystem partners, enable developers to create outstanding contactless applications utilizing speech recognition in a short period of time.
“I am pleased to announce the RX671, a product with the RXv3 CPU core that brings new features and is compatible with the popular RX651 in the current RX product family,” said Eiji Ito, vice president of the IoT Platform Business Unit at Renesas Electronics. Compatible. The new product combines real-time performance, power efficiency, HMI functionality, security features, and a variety of packaging options to fully meet the needs of our customers.”
The RX671 integrates Renesas Trusted Secure IP (TSIP) as part of its built-in hardware security engine; the engine includes a cryptographic engine supporting AES, RSA, ECC, and SHA, as well as a True Random Number Generator (TRNG) and cryptographic key management mechanism. These features, combined with on-chip dual-bank flash and protection mechanisms, provide users with features such as secure firmware updates and secure boot.
Renesas also introduced two new evaluation boards based on this new MCU product group. The RX671 target board makes evaluating the RX671 easier without the need for an external debugger; the RX671 development kit Renesas Starter Kit+ supports detailed evaluation of the MCU’s main functions. Both boards are equipped with connectors to connect to a Wi-Fi Pmod expansion board (RTK00WFMX0B00000BE) for easy evaluation using a wireless network connection. The Renesas Starter Kit+ and Wi-Fi Pmod expansion board combination for the RX671 is FreeRTOS certified, allowing users to get verified example programs from GitHub and connect with AWS to start development on the RX671 immediately.
Renesas has combined the RX671 MCU with its matching power supply device to deliver a complete contactless key solution that can be used on a wide range of devices to implement more hygienic proximity switches to prevent viruses or dirt from adhering to them. on the user’s finger. The solution is one of Renesas’ “Success Portfolio” – a “Success Portfolio” consisting of complementary analog + power + embedded processing products as a proven complete solution designed to help customers accelerate design processes and shorten product times time to market. Based on multiple products that work together seamlessly, Renesas has now launched more than 250 “Successful Product Portfolios” for various applications and end products.
【Introduction】Only by ensuring system security from process to product, the full advantages of wBMS technology can be realized. In early conversations with electric vehicle (EV) OEMs, the technical and commercial challenges of wireless battery management systems (wBMS) may seem daunting, but the rewards are too lucrative to ignore. Many of the inherent advantages of wireless connectivity over wired/cable architectures have been demonstrated in countless commercial applications, and BMS is yet another candidate area that clearly wants to ditch the cable.
Figure 1. Electric vehicle using a wireless battery management system (wBMS)
The prospect of lighter, modular, compact EV battery packs – finally free from cumbersome communication wiring harnesses – has been widely embraced. By eliminating up to 90% of the battery pack wiring and 15% of the battery pack volume, the design and size of the complete vehicle is significantly simplified, and the bill of materials (BOM) cost, development complexity and associated manual installation/maintenance efforts are greatly reduced.
What’s more, a single wireless battery design can be easily scaled across a OEM’s entire EV fleet without the need for extensive and costly battery pack wiring harness redesigns for each make and Model. With wBMS, depots are free to modify their frame designs without fear of needing to rearrange a lot of BMS wiring within the battery pack.
In the long term, continued reductions in vehicle weight and battery pack size will be critical to extending the range of electric vehicles in the years to come. Therefore, wBMS technology will play an important role in helping automakers improve the range, thereby helping to overcome consumers’ long-standing electric vehicle range anxiety.
Not only is this expected to spur an increase in overall EV market adoption, but it also gives automakers the opportunity to leap into EV market leadership with their ability to achieve long-range battery life. Going forward, this will remain a major differentiator for EV OEMs. For a more detailed description and market analysis of the benefits, see “The Electric Vehicle Wireless Battery Management Revolution Has Begun, with Huge ROI Potential”1.
new safety standard
A number of challenges need to be overcome to deliver on the promise of wBMS. The wireless communication used in wBMS needs to be robust enough to interference when the car is moving, and the system must be safe in all situations. However, a robust and secure design alone may not be enough to fight hardened attackers – this is where system security comes into play.
Such as urban or rural areas), whether someone uses another wireless device in the same frequency band in the car, it will cause the source of interference to change. Reflections within the battery pack can also degrade performance, depending on the material of the battery pack used to encapsulate the cells. The wBMS signal is likely to fluctuate and communications can be disrupted under natural conditions, let alone in the face of malicious attackers.
If the wBMS communication is interrupted for some reason, the car can go back to “safe mode”, reducing performance to allow the driver to take action, or when the wBMS communication is completely lost, the car can safely stop. This can be achieved through proper safety design, considering all possible failure modes in the system, and implementing end-to-end safety mechanisms to deal with random failures of components.
However, the security design did not take into account the possibility that malicious actors could exploit the system for certain purposes, including remote control of the vehicle. During Black Hat 2016, researchers demonstrated this possibility for a car in motion, enabling remote access through a vehicle gateway. Therefore, wireless robustness and fail-safe designs are not enough, security against attacks is also required. The black hat demonstration was a valuable lesson that future wireless systems in cars need to be designed in such a way that they cannot be exploited as another remote entry point. In contrast, conventional wired battery packs do not provide remote access, and to gain access to battery data, hackers need to physically tap into the high-voltage environment in the vehicle.
Additional safety challenges can arise during the life cycle of an EV battery, as shown in Figure 2. Analog Devices’ approach to wBMS design focuses on understanding the different stages an EV battery goes through—from factory delivery, through deployment and maintenance, and finally to the next life or end of life. These usage scenarios define the various functions that the wBMS must support. For example, preventing unauthorized remote access is a consideration during electric vehicle deployment, but more flexible access is required during manufacturing. Another example is during repairs where right-to-repair laws require a way for the owner to resolve a failure of the battery or associated wBMS. This means that software in the wBMS must be supported to be updated in a legal way, and the update mechanism should not compromise the safety of the car when it leaves the pit.
Additionally, EV batteries are sometimes redeployed to the energy sector when they no longer meet EV performance standards. This requires a secure transfer of ownership of EV batteries to the next stage of life. Batteries are devices with no built-in intelligence, so it is the responsibility of the wBMS that accompanies them to implement appropriate safety policies to best serve the EV battery life cycle. Before transitioning to the second life (echelon exploitation), all secrets of the first life must be securely erased.
Analog Devices anticipates these issues and addresses them in accordance with our own core design principles, which are a particular focus on maintaining and enhancing safety integrity from process to product and thorough review. At the same time, ISO/SAE 214342The standard “Road Vehicles: Cybersecurity Engineering” has been officially released in August 2021 after three years of development. It defines a similar exhaustive end-to-end process framework with four levels of network security assurance. Manufacturers and suppliers are rated on a scale of 1 to 4, with 4 representing the highest level of compliance (see Figure 3).
Figure 2. Electric vehicle battery life cycle and its associated wBMS life cycle
Figure 3. ISO/SAE 21434 framework with CAL 4 expectations
Analog Devices’ wBMS approach responds to ISO/SAE 21434 requirements and implements the highest level of inspection and rigor required for safe product development in the automotive industry. For this purpose, Analog Devices has engaged TÜV-NORD, a well-known and trusted certification laboratory, to evaluate our internal development strategies and processes. Our policies and processes have been reviewed and fully compliant with the new standard ISO 21434, as shown in Figure 4.
Figure 4. TÜV-Nord certificate
Rigorous scrutiny from device to network
Following the systematic process of wBMS product design, we perform a Threat Assessment and Risk Analysis (TARA) to clarify the threat profile based on how customers intend to use the product. By understanding what a system is for, and how it is used in various ways over its lifespan, we can determine which critical assets need protection against which potential threats.
There are several options for TARA technology, including the well-known Microsoft STRIDE approach, which models threats by considering six threats represented by the acronym STRIDE: Spoofing (S), Tampering (T), Denial (R), Disclosure ( I), Denial of Service (D) and Privilege Escalation (E). We can then apply it to the different interfaces of the components that make up the wBMS system, as shown in Figure 5. These interfaces are natural pause points in the data and control flow paths that a potential attacker could use to gain unauthorized access to system assets. In this case, by playing the attacker and asking ourselves how relevant each threat is to each interface and why, we can figure out possible attack paths and determine how likely the threat is to occur, and if an attack If successful, the consequences may be severe. We then repeat this thought process at different stages of the lifecycle, as the possible threats and impacts vary depending on the environment the product is in (eg warehouse vs deployment). This information will indicate that certain countermeasures are required.
Take the wireless channel between the wireless cellular monitor and the wBMS manager during deployment as an example, as shown in Figure 5. If the asset is data from a wireless cellular monitor, with concerns about leaking the data value to an eavesdropper, then we may need to encrypt the data as it travels through the wireless channel. If we are concerned about data being tampered with through the channel, then it may be necessary to protect the data with data integrity mechanisms such as message integrity codes. If there is a concern that someone will identify where the data is coming from, then we need a way to authenticate the wireless cellular monitor that communicates with the wBMS manager.
Through this exercise, we were able to identify the key security objectives of the wBMS system, as shown in Figure 6. These goals will require the implementation of mechanisms.
Many times we have to answer the question: “How much are we willing to pay to choose certain mechanisms to achieve specific security goals?” Adding more countermeasures would almost certainly improve the overall security posture of the product, but at a cost would be significant and may cause unnecessary inconvenience to the end consumer using the product. A common strategy is to mitigate the most likely and easiest to deploy threats. More sophisticated attacks tend to target higher-value assets and may require stronger security countermeasures, but this is highly unlikely, so the payoff is not worthwhile if implemented.
Figure 5. Threat surface considerations for wBMS
Figure 6. Security goals of wBMS
For example, in a wBMS, physical tampering of an IC device to gain access to battery data measurements while the vehicle is on the road is highly unlikely, since manipulation of parts of a moving car would require a Trained mechanic with deep knowledge of EV batteries. If an easier path existed, a real-life attacker would likely try such a path. A common type of attack on a networked system is a denial of service (DOS) attack – making a product unavailable to users. You can create a portable wireless jammer to try and jam the wBMS functionality (hard), but you can also deflate the tires (easy).
The step of addressing a risk with an appropriate set of mitigations is called a risk analysis. By measuring the impact and likelihood of the relevant threat before and after the introduction of appropriate countermeasures, we can determine whether residual risk has been reasonably minimized. The end result is that security features are included because they are required and the cost is acceptable to the customer.
TARA for wBMS points to two important aspects of wBMS security: device-level security and wireless network security.
The first rule of any security system is “Keep the keys safe!” That means both on the device and in our global manufacturing operations. Analog Devices’ wBMS device security takes into account hardware, IC, and low-level software on the IC and ensures that the system can safely boot from unalterable memory to a trusted platform for code to run. All software code is authenticated before execution, and any in-field software updates require pre-installed credentials to provide authorization. Once the system is deployed in the vehicle, rollback to a previous (and potentially vulnerable) software version is prohibited. Additionally, the debug port is locked after the system is deployed, eliminating the possibility of unauthorized backdoor access to the system.
Network security is designed to protect wireless communication between the wBMS unit monitoring node and the network manager inside the battery pack enclosure. Security starts with joining the network and the membership of all participating nodes is checked. This prevents random nodes from joining the network, even if they happen to be nearby nodes. Mutual authentication of nodes communicating with the network manager at the application layer will further protect the wireless communication channel so that a man-in-the-middle attacker cannot act as a legitimate node to communicate with the manager, and vice versa. Additionally, to ensure that only the intended recipient has access to the data, AES-based encryption is used to scramble the data, preventing information from leaking to any potential eavesdropper.
Like all security systems, at the heart of security is a set of encryption algorithms and keys. Analog Devices’ wBMS follows NIST-approved guidelines, which means that the chosen algorithm and key size should be consistent with the minimum security strength of 128 bits suitable for data-at-rest protection (e.g. AES-128, SHA-256, EC-256), And use algorithms from well-tested wireless communication standards such as IEEE 802.15.4.
The keys used to secure the device are usually installed during the ADI manufacturing process and never leave the IC device. These keys, which ensure system security, are physically protected by the IC device, preventing unauthorized access, whether in use or not. The Hierarchical Key Framework then protects all application-layer keys as encrypted binary blobs in non-volatile memory, including keys used in network security.
To facilitate mutual authentication of nodes in the network, ADI’s wBMS incorporates a unique public key key pair and a signed public key certificate into each wBMS node during manufacture. With a signed certificate, a node can verify that it is communicating with another legitimate ADI node and a valid network member, and a unique public key key pair is used by the node in a key agreement scheme to establish with another node or a BMS controller Secure communication channel. A benefit of this approach is that wBMS installation is easier and does not require a secure installation environment, as the nodes are set up to handle network security automatically after deployment.
In contrast, past schemes using pre-shared keys to establish secure channels often required a secure installation environment and an installation program to manually write key values for communication endpoints. To simplify and reduce the cost of dealing with key distribution issues, assigning a default public network key to all nodes in the network is often a shortcut that many people take. This often leads to a “one collapse, full plate collapse” disaster, which must be taken as a precaution.
As production scales up, OEMs need to be able to use the same wBMS with different numbers of wireless nodes for different EV platforms and install them in different secure manufacturing or repair locations, we tend to use a distributed key approach to reduce overall encryption complexity of key management.
The full benefits of wBMS technology can only be realized by ensuring safety from the device to the network over the entire life cycle of an EV battery. With this in mind, safety requires a system-level design philosophy, encompassing both process and product.
Analog Devices anticipated the core cybersecurity issues addressed by the ISO/SAE 21434 standard during the draft and incorporated countermeasures in our own wBMS design and development process. We are proud to be one of the first technology suppliers to achieve ISO/SAE 21434 compliance in terms of policies and processes, and our wBMS technology is currently receiving the highest level of cybersecurity assurance.
As a leader in modular signal switching and signal conditioning solutions in the field of Electronic test and simulation, Pickering UK has expanded its 16A current PXI switch product line. Following the success of the 16A discrete relay modules (models 40-161), Pickering is introducing a new family of 16A current PXI modules including:
16A Current PXI High Power Multiplexer (Model 40-662) – Supports seven different configurations ranging from four 2:1 to a single 16:1 multiplexer.
16A current PXI high-power matrix switch (model 40-552) – matrix size 8×2 and 4×4, supports four different configurations, and can also expand the matrix size through the Y-axis expansion port: such as 8×4, 12× 4, 16×4, etc. (based on 4×4 matrix) or 16×2, 24×2, 32×2, etc. (based on 8×2 matrix).
The two 16A current PXI switch families have the following features:
The switch design of this series of products carefully considers the operating temperature characteristics of the module, ensuring that all channels on the module can carry 16A of current at the same time without exceeding the overall temperature.
The application areas of this series of products include electric vehicles, automotive ECU testing, AC power supply switches, high current power supplies, load switches, and aerospace electric drive testing.
Pickering in the UK provides cable and connector solutions for all of its LXI, PCI and PXI switch solutions, including the latest 16A current PXI switch series. At the same time, Pickering can also provide customized services for cable kits for special needs.
All Pickering products come with a standard 3-year warranty and long-term product technical support. Product prices and related product information have been updated on the official website. For more information, please visit: www.pickeringtest.com
About Pickering Corporation
British Pickering company designs and manufactures modular signal switches and instruments for users in the field of electronic test and simulation. We offer the industry’s largest variety of switching solutions based on PXI, LXI, PCI and GPIB buses. At the same time, the whole line provides matching cables and connectors for users to choose. Pickering’s products are used in test systems all over the world and have been widely acclaimed for their high reliability and cost-effectiveness. Pickering’s business spreads all over the world. It has its own branches in China, the United States, the United Kingdom, Germany, Sweden, France and the Czech Republic. At the same time, it has established a cooperative agency distribution network in many countries in America, Europe and Asia. At present, we mainly serve the automotive electronics, aerospace, defense, power, energy and consumer electronics industries. For more information on signal switching and signal conditioning products and contact details for sales, please visit our official website: www.pickeringtest.com.
There are many members of the carbon material family, including macro-scale coke, diamond, expanded graphite,carbon fiberand nanoscale carbon nanotubes, fullerenes and graphene. Among them, coke is mainly used in blast furnace ironmaking, mechanical casting, calcium carbide production, chemical fertilizer chemical gas production, etc. The real materials used for material preparation are expanded graphite, carbon fiber and various nano-carbon materials. These carbon materials either become part of composite materials as fillers, or themselves become a series of products that can be seen everywhere in production and life, such as sealing materials and building materials, through processes such as weaving and molding.
Carbon fiber is a fibrous carbon material that is lighter than aluminum, stronger than steel, thinner than human hair, and contains more than 90% carbon. It has excellent properties such as high impact strength, high tensile modulus, low density, high temperature resistance, ablation resistance, corrosion resistance, high electrical and thermal conductivity, low thermal expansion, self-lubrication and good biocompatibility. Most carbon fibers are composed of incomplete graphite crystals arranged along the fiber axis. They are hexagonal network layered accumulations composed of sp^2 hybridization. The crystallites composed of carbon atoms are the microstructural units of carbon fibers. The layer spacing is about 0.3360~0.3440mm, and the parallel layers are irregularly stacked, lacking three-dimensional orderly arrangement, and showing a turbulent layer structure. When carbon fiber is annealed at high temperature, it experiences a high temperature above 2500°C. When the carbon content is greater than 99%, the interlayer spacing decreases, indicating that the carbon atoms have transformed from the turbostratic structure to the three-dimensional ordered graphite structure, forming a graphite-like structure. These two types of fibers are divided into carbon fibers and graphite fibers in China and the United States according to different heat treatment temperatures, while in Japan and Europe, they are used to be collectively referred to as carbon fibers.
After carbon fiber was invented to replace filament in the early 18th century, it is widely used in textiles, materials, military, aerospace, atomic energy and other fields. Since carbon fiber began to develop on a large scale with technology, its output has grown at an average rate of more than 15% every year. By 1990, the world’s total carbon fiber production was 10,496t. In order to meet the needs of general industrial carbon fiber, its industry turned to large The tow direction is developed and the production scale is expanded from a hundred tons to a thousand tons.
ISO 9001 certified. BE-CU Prototype Offering CNC machining carbon fiber and other manufacturing services for carbon fiber marterial. Various capabilities include notching, labeling, drilling carbon fiber, grinding, laser cutting carbon fiber, finishing, plating, marking, CNC milling carbon fiber and turning carbon fiber.We stock high quality 3k carbon fiber sheet in a variety of thickness, types and finish. Its a great material used in applications where light weight and strength are needed such as drones. Unlike other workshops, we have no min order and are often filling orders with a single part. We also don’t make you pay for the full sheet and you only get charged for what is used. With a large selection of material, you should find everything you need to make your project come to life. We are also able to handle larger production runs and provide a competitive pricing. If we don’t have the material or finish you require, we are more the willing to look at bringing it in for you.
What Is Carbon Fiber?Carbon fiber is made of polyacrylonitrile (PAN) (or pitch, viscose) and other organic fibers by carbonization (removal of most elements except carbon) by pyrolysis method under inert gas at high temperature above 1,000 °C. Inorganic polymer fibers with a carbon content of more than 90%.
On November 18, JD.com released its third-quarter 2021 results. Based on its firm confidence in future growth, JD.com will continue to increase its investment in basic science and underlying technology, and promote both the quantity and efficiency of infrastructure construction. Leveraging the new kinetic energy of deep integration of digital technology and the real economy, JD.com is a partner Expand broader growth space. Since the comprehensive transformation to technology in early 2017, the Jingdong system has invested nearly 75 billion yuan in technology.
Basic technology research, the other side of JD.com
Since the third quarter of this year, JD Exploration Research Institute has continued to strengthen investment and research in basic technologies, and has achieved fruitful results.
Just recently, the AI team of JD Discovery Research Institute won the Best Demonstration Award and Best Open Source Project Award at the 29th ACM Multimedia International AI Summit with its multi-modal interactive digital human technology and cross-modal analysis technology. It proves JD.com’s global leadership in the field of artificial intelligence vision and human-computer interaction.
The multi-modal interactive digital human technology ViDA-Man of JD Discovery Research Institute is committed to creating a human-computer interaction system with multi-sensory interaction capabilities, in-depth research on multi-modal interaction technology, and focusing on the creation of consumer technology products for human-computer interaction. The multi-modal interactive digital human image engine developed based on this technology can provide rapid image customization capabilities, gradually deepening from the digitization of appearance to the interaction of behavior and the intelligence of emotions.
These technologies have been applied on a large scale during the just-concluded Jingdong 11.11. For example, the search application based on computer vision to search for pictures, assisting the “photo shopping” and “matching shopping” functions of voice dialogue interaction technology can help consumers directly match the matching fashion items and create “one-stop shopping”. , a new shopping experience of “one-click purchase”.
Also recently, JD Research and NVIDIA, the world’s leading artificial intelligence and technology company, built the first domestic super-large computing cluster based on the SuperPOD architecture – Tianqin α, and announced the signing of a strategic cooperation agreement with NVIDIA, the two parties will jointly build artificial intelligence The joint laboratory has in-depth cooperation in large-scale parallel training, automated machine learning, large-scale reasoning acceleration, talent training, etc., and is committed to jointly promoting the breakthrough development of artificial intelligence.
JD.com built the first super large-scale computing cluster based on SuperPOD architecture in China – Tianqin α
In the third quarter, JD.com also cooperated with universities at home and abroad to propose the ViTAE Model and the largest mammalian pose estimation dataset in academia, continuing to promote the world’s leading AI basic research in the field of super deep learning. With JD.com’s ecological advantages in the field of digital and intelligent social supply chain, these cutting-edge research results will help promote the application of AI in retail, logistics, and industrial Internet.
In addition, the research team of the Information Security Laboratory of JD Discovery Research Institute also discovered a high-risk Android 11 system vulnerability chain, and immediately provided Google and other companies with vulnerability information and assisted in repairing, effectively avoiding the threat to the privacy and security of Android users. Companies such as Google and Samsung have released vulnerability patches and publicly thanked the security team of JD.com.
Doing scientific research should aim at the next fifteen years
Technology competition is international competition, and there are no shortcuts. Especially for basic core technologies, it is only possible to achieve breakthroughs by relying on long-term and unremitting investment in research and development. It is better to retreat and build a net instead of looking at the fish. JD.com has continued to invest in the technology field since the beginning of 2017, in order to build future-oriented core technologies and lay a solid foundation for the sustainable development of the industry.
Based on the technological development of various business groups and business units of JD.com, the JD.com Research Institute gathers the resources and capabilities of the entire group, focuses on the exploration of cutting-edge technologies, is committed to realizing an ecological platform for research and collaborative innovation, and empowers JD.com with original technologies Retail, logistics, health, technology and other whole industry chain scenarios, to create a source of technology highland.
Facing the future, the JD Research Institute has clearly focused its research on the three major areas of artificial intelligence: “trusted artificial intelligence”, “super deep learning” and “quantum machine learning”. Facing the field of pan-artificial intelligence, JD Research Institute takes trusted artificial intelligence as the research direction of three to five years, super deep learning as the research direction of five to ten years, and quantum machine learning as the research direction of ten to fifteen years. The direction is mutual succession and gradual progress. In the next three to fifteen years, the JD Research Institute will start from these three research fields, rely on basic theoretical research to achieve subversive innovation, and help the digital and intelligent development of the industry.
Forward-looking basic technology research is the only way for enterprises to build their core competitiveness. In the recently announced “Top 100 New Entity Enterprises in 2021”, Huawei and JD.com are the top two, which fully proves that future industry leaders must continue to invest in the field of basic science and can lead the trend of industrial digitization and digital industrialization. Promote the overall growth of the industry with substance, technology, and ecological inclusiveness, provide the society with a new type of infrastructure that is inclusive and shared, and actively fulfill social responsibilities.
In recent years, JD.com has made a comprehensive layout in artificial intelligence and other technical fields. In the past few years, JD. The important task of building the national “New Generation Intelligent Supply Chain Artificial Intelligence Open Innovation Platform”; taking the lead in undertaking and participating in the Ministry of Science and Technology’s national key R&D program “National Central City Data Management and Knowledge Extraction Technology and System Application”, Ministry of Science and Technology “National New District Digital Twin” System and Converged Network Computing System Construction”, etc.
“AI For Social Good – Adhere to the ethics of technology and make technology with warmth.” Professor Tao Dacheng, dean of the JD Discovery Research Institute, said. Under this vision, JD Exploration Research Institute will continue to study how to combine and connect AI in the new development pattern of dual cycle, carbon neutrality, intelligent supply chain, knowledge accumulation and humanistic development, and realize technological innovation, production and research. Coordination, talent training, scientific research assistance, cross-border integration and scientific and technological fairness, balanced and harmonious development.
Jingdong attaches great importance to the cultivation of technical talents. Statistics show that nearly 80% of the post-90s technical graduates of JD.com have rapidly grown into mature senior talents, and more and more post-90s and post-95s young people are taking up management positions. The youngest is only 28 years old. JD.com has also launched the “Doctoral Management Trainee” talent program to select outstanding doctoral students from top universities at home and abroad. A large number of high-end talents from the Chinese Academy of Sciences, Qingbei, and Ivy League have joined JD.com. They have extraordinary insights or achievements in various technical fields.
As a new type of entity enterprise, JD.com also possesses the genes and attributes of entity enterprises, as well as digital technology and capabilities. Facing the era of industrial digitalization, JD.com will adhere to the mission of “technology-based, committed to a more efficient and sustainable world”, continue to invest in basic science and underlying technologies, and consolidate the “technical foundation of the digitally-intelligent social supply chain” “In the next decade, we will continue to promote the three long-term goals of empowering the real economy, improving social efficiency, and promoting environmental friendliness to create greater social value.
Renesas Electronics Group (TSE: 6723), a global supplier of semiconductor solutions, today announced the introduction of the ProXO+ product family of compact, ultra-low noise, temperature-compensated clock oscillators, expanding its robust lineup of clock solutions. The new high precision, high frequency differential oscillator products are suitable for fiber optic transceiver modules, accelerator cards, smart NIC cards and network equipment applications.
Bobby Matinpour, vice president of the Clock Products Business Unit at Renesas Electronics, said: “The ProXO+ product family has key features required in the communications, cloud and computing fields, providing high frequency stability, excellent jitter performance, and high output frequency support. ProXO+ products The highly programmable nature of the family allows a single chip to be used in multiple designs, simplifying bill of materials, procurement and inventory management.”
Key Features of the ProXO+ Product Family
Frequency stability of ±3ppm over -40°C to +85°C temperature range
Programmable frequency up to 2.1GHz
Typical phase jitter of 135fs (12KHz-20MHz)
Available in 3.2mm x 2.5mm, 8-pin plastic package
In addition to the new ProXO+ product family, Renesas has expanded its popular and classic ProXO XF 2.5mm x 2.0mm package offerings to include two new industry-standard 3.2mm x 2.5mm and 5.0mm x 3.2mm new plastic packages.
The ProXO+ product family can be combined with Renesas’ clock buffer, power and microcontroller products to provide comprehensive solutions for a wide range of applications, such as Xilinx Kintex-7 power and clock products, CC-Link IE TSN, and RZ-equipped /G2E’s System of Modular (SoM) solutions, etc. The Renesas “Success Portfolio” is a proven solution designed to help customers accelerate designs and shorten time to market.
Renesas is committed to building a broad portfolio of clock products to support complete clock trees. As an outstanding supplier in the field of clock chips, Renesas has long continued to bring superior technologies to the market, while providing “one-stop” clock solutions, covering from full-featured system-level solutions to the expertise and products required for simple clock components .