Achieve functional safety and information security through various mechanisms.
Implement secure boot through safe reset and rapid start-up mechanisms.
Achieve safety monitoring and health management through mechanisms such as kernel monitoring, analysis and diagnosis of exception logs, and kernel exception handling.
Ensure that highly secure systems are not affected by relatively open infotainment systems by implementing partition isolation, allowing each system to operate independently in different spaces.
Introduce a trusted execution environment (TEE) to prevent unauthorized access to high-security operations such as payments and system upgrades by verifying certificates, tokens, signatures, permissions, and other credentials.