BlackBerry QNX – Six Software Essentials for Commercial Vehicles
Commercial vehicles—trucks, buses and delivery vans—must be cost efficient to build and maintain, and they must run reliably for decades. Yet, as the electronic architecture of such vehicles evolves and software complexity increases, their development, safety certification and cybersecurity become more difficult and costly to achieve.
That is why many OEMs are choosing a single commercial operating system (OS) for all critical ECUs—digital cockpit, telematics, gateway, driver assistance—and seeking a vendor that can provide not only high-performance foundational software but also long-term product support and engineering services.
When considering options for foundational software for commercial vehicles, OEMs should look for six software essentials:
1.Performance and Reliability
A microkernel architecture to protect critical functions
For more than 40 years the BlackBerry® QNX® operating system has provided OEMs the reliable choice for their critical systems, including those deployed in more than 175 million passenger vehicles. The QNX microkernel real-time OS (RTOS) isolates components so that a failure won’t impact the rest of the system. It also provides the determinism necessary to ensure high performance in the most difficult environments.
A streamlined path for industry certifications such ISO 26262
With a pre-certified operating system, OEMS need certify only what they build, not what it is built on. Pre-certified by TÜV Rheinland to IEC 61508 SIL 3 and ISO 26262:2018 ASIL D, the QNX OS for Safety and QNX Hypervisor for Safety can significantly reduce the certification burden.
Multi-layered security and protection for the entire software development life cycle
The QNX Neutrino® RTOS provides layered security with a smaller attack surface, granular control of system privilege levels, an AES-256 encrypted and self-verifying filesystem, and secure boot.QNX Black Channel Communications Technology helps ensure safe data communication even over unsafe links (UDP, TCP, CAN), andBlackBerry Jarvis™finds vulnerabilities without requiring access to source code.
A foundation to meet the most challenging production schedules
To simplify porting and development, the QNX Neutrino RTOS and the QNX Hypervisor support the AUTOSAR Adaptive standard, are POSIX-compliant and use the Eclipse development environment. Safety-certified variants include C and C++ toolchains qualified to IEC 61508 and ISO 26262.
A simple mechanism for porting legacy code and prototypes, and for upgrades
System complexity is best managed through simplification. That’s why OEMs embrace virtualization and the QNX Hypervisor which enable diverse OSs (e.g., QNX, Android, Linux) to run on a single system-on-a-chip (SoC). Building on a proven, high-performance hypervisor enables developers to reuse legacy code on new hardware and implement new features or upgrade entire systems while remaining confident that other systems won’t be adversely affected.
6.Safety and Security Services
Expert engineering services and safety-certification guidance
BlackBerry QNX provides extensive embedded development, functional safety training and engineering services. Having successfully certified its own products, the QNX safety services team helps OEMs successfully navigate the arduous certification process. BlackBerry’s security services include cybersecurity and WP.29 readiness assessments as well as threat modeling and penetration testing.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.