Bosch combines its in-depth vehicle expertise with software competence and machine learning to make cars smart.
Multi-layer security concepts from Bosch protect vehicles from hacker attacks.
The central intelligence of automated vehicles lies in the software which runs on the vehicle computer in the form of adaptive algorithms. It analyses and interprets incoming data from the surround-sensor system. It can, for example, detect whether an object perceived by the sensors is a car, a pedestrian or a cyclist, the direction it is moving in, and at what speed. This way, it learns the high art of anticipation: by observing a large number of objects in the development process, the system can determine their respective characteristic behavior which helps it to make forecasts which are ever more reliable. Just like people are capable of learning from experience. In the future, the vehicle's intelligence can calculate the probability of a pedestrian crossing the road and activate the brake system in good time. Its swift powers of perception and extremely fast reaction times mean that it has a clear advantage over human drivers.
Chairman of the business sector Mobility Solutions at Bosch
Safety during automated driving means more than just consistently avoiding accidents. Automated and connected vehicles must also be protected from external manipulation. Furthermore, it must be possible to handle a possible failure by a system of safety relevance at all times. Bosch already offers effective solutions for both: redundant system components protecting against failures and a well-conceived security concept for protecting against manipulation.
In the event of a hacker attack on the vehicle systems, Bosch has a multi-layer security concept to prevent attacks on the automated vehicle. The individual control units and the internal network, electrical and electronic systems as well as the interfaces to the internet and the cloud are protected by individual measures. Accordingly, if one security measure is overcome, it is impossible for the entire system to be compromised.