Achieve functional safety and information security through various mechanisms.
• Implement secure boot through safe reset and rapid start-up mechanisms.
• Achieve safety monitoring and health management through mechanisms such as kernel monitoring, analysis and diagnosis of exception logs, and kernel exception handling.
• Ensure that highly secure systems are not affected by relatively open infotainment systems by implementing partition isolation, allowing each system to operate independently in different spaces.
• Introduce a trusted execution environment (TEE) to prevent unauthorized access to high-security operations such as payments and system upgrades by verifying certificates, tokens, signatures, permissions, and other credentials.