{"id":33713,"date":"2026-03-11T11:47:26","date_gmt":"2026-03-11T03:47:26","guid":{"rendered":"https:\/\/aiportek.com\/?p=33713"},"modified":"2026-03-11T13:32:24","modified_gmt":"2026-03-11T05:32:24","slug":"cyber-resilience-act-compliance-onekey","status":"publish","type":"post","link":"https:\/\/aiportek.com\/en\/cyber-resilience-act-compliance-onekey\/","title":{"rendered":"HongKeys Solution] How to land CRA compliance? Network security engineer perspective to bring you to understand the logic of compliance and ONEKEY security and compliance platform value."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"33713\" class=\"elementor elementor-33713\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-303a47ec elementor-section-stretched elementor-section-full_width elementor-section-height-min-height elementor-section-content-middle elementor-section-height-default elementor-section-items-middle\" data-id=\"303a47ec\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27d5e225\" data-id=\"27d5e225\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4e369ae3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e369ae3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6555484e\" data-id=\"6555484e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-397ef20e elementor-widget elementor-widget-heading\" data-id=\"397ef20e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hongke's latest articles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b5c0d9b elementor-absolute elementor-widget elementor-widget-heading\" data-id=\"4b5c0d9b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HongKe<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d18033c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d18033c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f96cecf\" data-id=\"1f96cecf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f8d8197 elementor-widget elementor-widget-heading\" data-id=\"f8d8197\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Add your title text here<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18d8549 elementor-widget elementor-widget-heading\" data-id=\"18d8549\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">I. Introduction: Strategic Changes at the Data Layer under the Critical Infrastructure Legislation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63554e9 elementor-widget elementor-widget-heading\" data-id=\"63554e9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Add your title text here<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4b0e7b4e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b0e7b4e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7a4b7cfc\" data-id=\"7a4b7cfc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79a3214 elementor-widget elementor-widget-heading\" data-id=\"79a3214\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">[Rainbow Section Program] <font face=\"Lora, sans-serif\"><span style=\"font-style: inherit;letter-spacing: 0px\">How does CRA compliance work? Network Security Engineer's Perspective brings you to understand the logic of compliance and ONEKEY.<\/span>Secure and Compliant Platforms<span style=\"font-style: inherit;letter-spacing: 0px\">Value<\/span><\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-226f412 elementor-widget elementor-widget-post-info\" data-id=\"226f412\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-2358f4d elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/aiportek.com\/en\/author\/hongketechnology\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-user-circle\" viewbox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M248 104c-53 0-96 43-96 96s43 96 96 96 96-43 96-96-43-96-96-96zm0 144c-26.5 0-48-21.5-48-48s21.5-48 48-48 48 21.5 48 48-21.5 48-48 48zm0-240C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm0 448c-49.7 0-95.1-18.3-130.1-48.4 14.9-23 40.4-38.6 69.6-39.5 20.8 6.4 40.6 9.6 60.5 9.6s39.7-3.1 60.5-9.6c29.2 1 54.7 16.5 69.6 39.5-35 30.1-80.4 48.4-130.1 48.4zm162.7-84.1c-24.4-31.4-62.1-51.9-105.1-51.9-10.2 0-26 9.6-57.6 9.6-31.5 0-47.4-9.6-57.6-9.6-42.9 0-80.6 20.5-105.1 51.9C61.9 339.2 48 299.2 48 256c0-110.3 89.7-200 200-200s200 89.7 200 200c0 43.2-13.9 83.2-37.3 115.9z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t\t\t\tHongKeTechnology\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a689c23 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/aiportek.com\/en\/2026\/03\/11\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-calendar\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M12 192h424c6.6 0 12 5.4 12 12v260c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V204c0-6.6 5.4-12 12-12zm436-44v-36c0-26.5-21.5-48-48-48h-48V12c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v52H160V12c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v52H48C21.5 64 0 85.5 0 112v36c0 6.6 5.4 12 12 12h424c6.6 0 12-5.4 12-12z\"><\/path><\/svg>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>March 11, 2026<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c027dd7 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c027dd7\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-410d603 elementor-widget elementor-widget-text-editor\" data-id=\"410d603\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-KfAFdV9kwo4EIGxt2kycZmOTnUf\">In terms of the actual project, the EU CRA (Network Firmware Act) has become a mandatory entry threshold for digital products to enter the European market, and non-compliance can be subject to a maximum fine of 2.5% of the global annual turnover. According to IBM statistics, products that do not establish a compliance system, the incidence of security incidents is 3.7 times higher than that of compliant products, and the average cost of a data breach is increased by US$1.8 million. CRA is aimed at manufacturers, importers, distributors, authorized representatives, and other subjects, and mandates full lifecycle security and supply chain transparency.<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13d8a5b elementor-widget elementor-widget-image\" data-id=\"13d8a5b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"563\" src=\"https:\/\/aiportek.com\/wp-content\/uploads\/2026\/03\/1921265081.1000.jpg\" class=\"attachment-large size-large wp-image-33720\" alt=\"\" srcset=\"https:\/\/aiportek.com\/wp-content\/uploads\/2026\/03\/1921265081.1000.jpg 1000w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/03\/1921265081.1000-300x169.jpg 300w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/03\/1921265081.1000-768x432.jpg 768w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/03\/1921265081.1000-18x10.jpg 18w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/03\/1921265081.1000-600x338.jpg 600w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-935e8cd elementor-widget elementor-widget-heading\" data-id=\"935e8cd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">I. Industry Status: Real Compliance Pressure from CRA<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c981779 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c981779\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"EtK1dKaZJoL1lUxYukqcMsytnmb\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div data-page-id=\"Q77BdnHWcoUk44xsnmbcUdetnjb\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-OwcrdnX40o0chmxTrGLc5sRknCc\">From the perspective of engineering landing, enterprises are generally facing four major pain points:<\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b4391a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6b4391a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"EtK1dKaZJoL1lUxYukqcMsytnmb\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div data-page-id=\"Q77BdnHWcoUk44xsnmbcUdetnjb\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-OwcrdnX40o0chmxTrGLc5sRknCc\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"old-record-id-Hf8md5c7VoNuPFxJ1sYczL9FnEe\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><p><strong>(i) High cost of regulatory understanding<\/strong><\/p><p>CRA clauses are complex and cover the entire life cycle, so manual clause-by-clause checking is prone to omissions and blurred compliance boundaries.<\/p><p><strong>(ii) Non-transparent supply chain<\/strong><\/p><p>A large number of products use third-party firmware, open-source components, and lack a complete software bill of materials (SBOM) to meet CRA transparency requirements.<\/p><p><strong>(iii) The Vulnerability Response Requirement is Stringent<\/strong><\/p><p>The CRA requires vulnerabilities to be reported within 24 hours and mitigated within 72 hours, which is difficult to achieve with traditional manual processes.<\/p><p><strong>(iv) Difficulty in closing the loop on evidence of compliance<\/strong><\/p><p>Regulators need a traceable, verifiable and reproducible chain of evidence, and manual documents have low credibility and high risk of failure.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab8218f elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ab8218f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"EtK1dKaZJoL1lUxYukqcMsytnmb\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div data-page-id=\"Q77BdnHWcoUk44xsnmbcUdetnjb\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-OwcrdnX40o0chmxTrGLc5sRknCc\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-Fzkfd32j7onvGMxGwIzcSDshnyb\">These pain points are not scare tactics, but real engineering bottlenecks commonly encountered by companies in the CRA era.<\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fd6f8f elementor-widget elementor-widget-heading\" data-id=\"1fd6f8f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Working principle and technical support<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a046c3e elementor-widget elementor-widget-text-editor\" data-id=\"a046c3e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-W4MfdLXXqo7tujx6QrhcpkAEnec\">ONEKEY's core technology lines are<strong>Firmware depth inverse analysis + automated compliance engine<\/strong>The overall structure is very suitable for CRA scenarios:<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebd513e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ebd513e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"EtK1dKaZJoL1lUxYukqcMsytnmb\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div data-page-id=\"Q77BdnHWcoUk44xsnmbcUdetnjb\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-OwcrdnX40o0chmxTrGLc5sRknCc\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-Fzkfd32j7onvGMxGwIzcSDshnyb\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-Wd6LdbTSLoxvrcxalZ4cweD2nSf\"><strong>(A) Binary Firmware Fully Automated Analysis<\/strong><\/div><div class=\"ace-line ace-line old-record-id-Wd6LdbTSLoxvrcxalZ4cweD2nSf\">Directly unpacks, partition recognizes, and extracts the file system from the firmware image without source code or compilation environment.<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-GUYsdIrKcohmkcxGXlqc5G50nbf\"><strong>(ii) Component Identification and SBOM Auto Generation<\/strong><\/div><div class=\"ace-line ace-line old-record-id-GUYsdIrKcohmkcxGXlqc5G50nbf\">Identify open source components, versions, license terms, and known CVE vulnerabilities to form a standardized SBOM list.<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-UAMNdUdWPoukkHxtQKpcOScXnCc\"><strong>(iii) CRA Rule Engine Automation Comparison<\/strong><\/div><div class=\"ace-line ace-line old-record-id-UAMNdUdWPoukkHxtQKpcOScXnCc\">Built-in CRA official requirements and assessment items, automatic completion of compliance check, risk classification, gap analysis.<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-Hj4TdBA8boFT7dxIfmwcdUhHnDc\"><strong>(iv) Automatic archiving of the chain of evidence<\/strong><\/div><div class=\"ace-line ace-line old-record-id-Hj4TdBA8boFT7dxIfmwcdUhHnDc\">The entire testing process, results and repair records are kept, forming a package of evidence that can be directly used for regulatory review.<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-A2rddMkHQoA0V7xZBF9c7ZEZn0d\">In real projects, this framework can be realized:<\/div><ul class=\"list-bullet1\"><li class=\"ace-line ace-line old-record-id-MerTdY4mOogEFfxCQ56cejYbnyl\" data-list=\"bullet\"><div>Do in a few hours what you did in the last few weeks manually.<\/div><\/li><li class=\"ace-line ace-line old-record-id-HwcAdW1myollzgxibr1ctvQrnuc\" data-list=\"bullet\"><div>In-depth security analysis without source code<\/div><\/li><li class=\"ace-line ace-line old-record-id-LufndWCJ8oMWWFxZn82cvTV9nAc\" data-list=\"bullet\"><div>Compliance results are reproducible and verifiable<\/div><\/li><\/ul><div class=\"ace-line ace-line old-record-id-DciwdI3b1oQeupxemAIcZSUenDe\">This is the key to its ability to steadily support CRA compliance.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18ccff5 elementor-widget elementor-widget-heading\" data-id=\"18ccff5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Core Functions and Actual Engineering Value<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e69fbf elementor-widget elementor-widget-text-editor\" data-id=\"0e69fbf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"Q77BdnHWcoUk44xsnmbcUdetnjb\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-doxcnQIZsDs6fDKBUQMJEnpOH9d\"><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-UzcMdSOvVoCf5QxgC9Uc3ftqnaf\"><strong>(i)<\/strong><strong>CRA Full Process Compliance Assessment<\/strong><\/div><div class=\"ace-line ace-line old-record-id-UzcMdSOvVoCf5QxgC9Uc3ftqnaf\">Automated assessment against CRA regulatory requirements, including product risk level, security documentation, vulnerability management, supply chain security, incident response, etc., and output of compliance gap reports, so that enterprises can clearly grasp \"where they are out of compliance and how to improve\".<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-PU5ndlKtfoWsBaxyVOaccVLMnPd\"><strong>(ii) Fully automated SBOM generation and management<\/strong><\/div><div class=\"ace-line ace-line old-record-id-PU5ndlKtfoWsBaxyVOaccVLMnPd\">Generate complete SBOMs directly from firmware binary with support for standard formats such as SPDX and CycloneDX, solving the CRA-mandated issue of supply chain transparency and avoiding compliance denials due to unknown components.<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-Uny8dukYeoVTWExEoTBc4CKBnkd\"><strong>(iii) Firmware Depth Vulnerability Detection<\/strong><\/div><div class=\"ace-line ace-line old-record-id-Uny8dukYeoVTWExEoTBc4CKBnkd\">Supports PNG detection and recognition:<\/div><ul class=\"list-bullet1\"><li class=\"ace-line ace-line old-record-id-TkQBdQWAeoeUqrxtOxBcdaumnzb\" data-list=\"bullet\"><div>Known CVE Vulnerabilities<\/div><\/li><li class=\"ace-line ace-line old-record-id-VtOidpsrXofxRIxjGQncW6qlnid\" data-list=\"bullet\"><div>Weak code, hard-coded gold key<\/div><\/li><li class=\"ace-line ace-line old-record-id-WV01dZ5GnoQ0Qhxe5yBcqvuhn3c\" data-list=\"bullet\"><div>Unsecure Communication Settings<\/div><\/li><li class=\"ace-line ace-line old-record-id-Qsg8dG4FOosnIhxWmNKccHILnrg\" data-list=\"bullet\"><div>Risks of unauthorized access, debugging port opening, etc.<\/div><\/li><\/ul><div class=\"ace-line ace-line old-record-id-GBX1dppmGoeA4rxk3zsctP7dn0e\">Meet the CRA's mandatory requirements for vulnerability discovery, handling, and reporting.<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-B0nEd6t4coylDQxobyCc76zcnxh\"><strong>(iv) Automatic generation and retention of compliance evidence<\/strong><\/div><div class=\"ace-line ace-line old-record-id-B0nEd6t4coylDQxobyCc76zcnxh\">Automatically generates audit logs, detection reports, rectification records and evidence packages to meet CRA's requirements for traceability and certifiability, making it easier to respond to regulatory spot checks.<\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe2b3d elementor-widget elementor-widget-heading\" data-id=\"dbe2b3d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementation Paths and Best Practices<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee82482 elementor-widget elementor-widget-text-editor\" data-id=\"ee82482\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-Y0GadsjFYoD3wGxcdg4cnQSxnhg\">From the first-tier experience, CRA compliance can be steadily progressed in four steps:<\/div><div>\u00a0<\/div><ol class=\"list-number1\" start=\"1\"><li class=\"ace-line ace-line old-record-id-DxVEdAWWWoso6qxWzX8cFAM5ned\" data-list=\"number\"><div><strong>Firmware Upload and Basic Analysis<\/strong> - Upload firmware, ONEKEY automatically unpacks, recognizes components, and generates SBOM.<\/div><\/li><li class=\"ace-line ace-line old-record-id-SUMdd49Fio7BJ5xtZuncRVM9nNg\" data-list=\"number\"><div><strong>CRA Compliance Assessment<\/strong> - The system automatically completes the compliance check, outputs risk items and recommends corrective actions.<\/div><\/li><li class=\"ace-line ace-line old-record-id-N4godtNK5onr6CxQRqYcoNoYnkc\" data-list=\"number\"><div><strong>Bug fixes and iterative validation<\/strong> - Prioritize remediation of high-risk vulnerabilities, update firmware and redetect until compliance is achieved.<\/div><\/li><li class=\"ace-line ace-line old-record-id-ELcqdDRjyorIjGxuLn5cOQeEnf1\" data-list=\"number\"><div><strong>Continuous monitoring and long-term compliance<\/strong> - Automatically rechecks for new firmware versions and vulnerabilities as they are revealed to maintain continuous compliance.<\/div><\/li><\/ol><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-Qu47dlT8jo0882xPWSPcwH7wnlg\"><strong>Actual case effectiveness:<\/strong><\/div><div><table><colgroup> <col width=\"105\" \/> <col width=\"105\" \/> <col width=\"105\" \/><\/colgroup><tbody><tr><td>Indicator<\/td><td>Manual Compliance<\/td><td>Using ONEKEY<\/td><\/tr><tr><td>Completion of Foundation Compliance<\/td><td>1 to 2 months<\/td><td>3 to 7 days<\/td><\/tr><tr><td>Vulnerability Discovery Efficiency Improvement<\/td><td>benchmark<\/td><td>Upgrade 80% or above<\/td><\/tr><tr><td>Compliance Evidence Completeness<\/td><td>Insufficient 30%<\/td><td>Approaching 100%<\/td><\/tr><\/tbody><\/table><div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-W6rldn21EojVFxxqRoncAWjvnSc\">Judging from the engineering practicality: In the face of CRA's strong compliance, evidence, and timeliness requirements, the Algorithmic ONEKEY is a more stable, more efficient, and more reliable choice.<\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d882e7c elementor-widget elementor-widget-heading\" data-id=\"d882e7c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions (FAQ)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a261876 elementor-widget elementor-widget-text-editor\" data-id=\"a261876\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-page-id=\"KRphdEE5koy7OixXEp1cGXVUnyc\" data-lark-html-role=\"root\" data-docx-has-block-data=\"false\"><div class=\"ace-line ace-line old-record-id-DBiHdjvkJoLqvHx45xtccfxOnwh\"><strong>Q: What is the main difference between Algorithmic ONEKEY and traditional vulnerability scanning tools?<\/strong> A: While traditional tools focus on vulnerability scanning, IZP's ONEKEY is based on CRA compliance objectives, providing compliance assessment, SBOM generation, firmware in-depth analysis, and evidence chain archiving in a single package, eliminating the need for multi-tools, and making it more suitable for meeting mandatory regulatory requirements.<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-ScFXdkFGdoWsIqxpJwScJQS7nlf\"><strong>Q: How long does it usually take to administer Esteem ONEKEY?<\/strong> A: With complete data, firmware analysis and compliance diagnosis can be completed in 1-3 days; for medium complexity products, rectification can be completed in 1-2 weeks and a compliance evidence package can be formed; and long-term compliance can be maintained with continuous monitoring.<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-V2y3dcf2xognOYxYxFRco76enwb\"><strong>Q: How can we ensure the quality and credibility of our compliance content?<\/strong> A: The platform is based on real-world firmware analysis, not manual reporting, and all results are traceable and reproducible. the CRA rule base is continuously synchronized with regulatory updates, and the output reports have an objective engineering basis and can directly support regulatory review and compliance verification.<\/div><div>\u00a0<\/div><div class=\"ace-line ace-line old-record-id-FQrIdeFf4oIxsqxHWMKcqspSnkh\">The above is a technical analysis and practical advice on the logic of CRA compliance combined with many years of frontline practical experience. To be honest, CRA compliance is not a small difficulty, and the pain points faced by different enterprises are also different. If you encounter any difficulties in the process of CRA compliance, or are interested in AIJINGBAO ONEKEY products, please feel free to communicate and exchange ideas, and we will work together to explore solutions, share practical experience, and help you efficiently complete the CRA compliance, avoid compliance risks, and successfully open up the overseas market.<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45ed7c8 elementor-widget elementor-widget-button\" data-id=\"45ed7c8\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/aiportek.com\/iot-device-security-compliance-platform\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Go to ONEKEY product page<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-9049411 e-flex e-con-boxed e-con e-parent\" data-id=\"9049411\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cfcf4de e-flex e-con-boxed e-con e-parent\" data-id=\"cfcf4de\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dbc1b58 elementor-widget elementor-widget-heading\" data-id=\"dbc1b58\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">Other Articles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74adc8f elementor-posts--align-left elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"74adc8f\" data-element_type=\"widget\" data-settings=\"{&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-34445 post type-post status-publish format-standard has-post-thumbnail hentry category-12 category-11 tag-redis tag-36\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/aiportek.com\/en\/redis-finance\/\" tabindex=\"-1\" target=\"_blank\"><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/\u91d1\u878d.jpeg\" class=\"attachment-full size-full wp-image-34451\" alt=\"\" srcset=\"https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/\u91d1\u878d.jpeg 2560w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/\u91d1\u878d-300x200.jpeg 300w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/\u91d1\u878d-1024x683.jpeg 1024w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/\u91d1\u878d-768x512.jpeg 768w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/\u91d1\u878d-1536x1024.jpeg 1536w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/\u91d1\u878d-2048x1366.jpeg 2048w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/\u91d1\u878d-18x12.jpeg 18w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/\u91d1\u878d-600x400.jpeg 600w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Hongke Dry Goods<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/aiportek.com\/en\/redis-finance\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tRainbow Solutions] 2026 Procurement Committee Must-Have: Hong Kong Bank Redis Procurement Checklist (Open Source vs Enterprise Decision Framework)\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>The HKMA has repeatedly emphasized risk-based and principle-driven requirements in recent years, and has brought the risk of third-party IT solutions to the forefront, meaning that it's fine to turn on Maintenance or Redis Enterprise, but you have to prove that the \"controls work\" rather than that the \"tool is famous\".<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/aiportek.com\/en\/redis-finance\/\" aria-label=\"Read more about \u3010\u8679\u79d1\u65b9\u6848\u3011 2026 \u63a1\u8cfc\u59d4\u54e1\u6703\u5fc5\u5099\uff1a\u9999\u6e2f\u9280\u884c Redis \u63a1\u8cfc\u6aa2\u67e5\u6e05\u55ae\uff08\u958b\u6e90 vs \u4f01\u696d\u7248\u6c7a\u7b56\u6846\u67b6\uff09\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-author\">\n\t\t\tHongKeTechnology\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tApril 27, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-34388 post type-post status-publish format-standard has-post-thumbnail hentry category-18 tag-peak tag-38\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/aiportek.com\/en\/analog-digital-signal-mapping-can-fd-guide\/\" tabindex=\"-1\" target=\"_blank\"><div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"1024\" height=\"567\" src=\"https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-7.webp\" class=\"attachment-full size-full wp-image-34389\" alt=\"\" srcset=\"https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-7.webp 1024w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-7-300x166.webp 300w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-7-768x425.webp 768w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-7-18x10.webp 18w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-7-600x332.webp 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Hongke Case<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/aiportek.com\/en\/analog-digital-signal-mapping-can-fd-guide\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tHow to map analog signals to CAN\/CAN FD telegrams? One Step Guide\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Get an in-depth look at how to accurately convert analog signals such as temperature and pressure into CAN\/CAN FD telegrams using a data acquisition module (DAQ). This guide covers quantization, packaging principles, and hands-on procedures for automotive electronics and industrial automation engineering development.<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/aiportek.com\/en\/analog-digital-signal-mapping-can-fd-guide\/\" aria-label=\"Read more about \u3010\u8679\u79d1\u65b9\u6848\u3011 \u5982\u4f55\u5c07\u6a21\u64ec\u8a0a\u865f\u6620\u5c04\u81f3 CAN\/CAN FD \u5831\u6587\uff1f\u4e00\u6b65\u5230\u4f4d\u6307\u5357\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-author\">\n\t\t\tHongKeTechnology\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tApril 21, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-34221 post type-post status-publish format-standard has-post-thumbnail hentry category-18 tag-aimotive tag-64\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/aiportek.com\/en\/hongke-dual-modal-autonomous-driving-simulation-3dgs-aisim\/\" tabindex=\"-1\" target=\"_blank\"><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"587\" src=\"https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-1-1.webp\" class=\"attachment-full size-full wp-image-34223\" alt=\"\" srcset=\"https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-1-1.webp 1080w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-1-1-300x163.webp 300w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-1-1-1024x557.webp 1024w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-1-1-768x417.webp 768w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-1-1-18x10.webp 18w, https:\/\/aiportek.com\/wp-content\/uploads\/2026\/04\/640-1-1-600x326.webp 600w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Hongke Case<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/aiportek.com\/en\/hongke-dual-modal-autonomous-driving-simulation-3dgs-aisim\/\" target=\"&quot;_blank&quot;\">\n\t\t\t\tHongKe Solution] HongKe Dual Mode Simulation Test Solution: 3DGS and aiSim | Digital Life\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>HONGKE launched a dual-mode simulation solution for autonomous driving, combining the aiSim physics engine and 3DGS\/NeRF technology to realize physical-level sensor modeling and high-fidelity scene reconstruction, solving the difficult problem of end-to-end closed-loop testing for smart driving.<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/aiportek.com\/en\/hongke-dual-modal-autonomous-driving-simulation-3dgs-aisim\/\" aria-label=\"Read more about \u3010\u8679\u79d1\u65b9\u6848\u3011 \u8679\u79d1\u96d9\u6a21\u614b\u4eff\u771f\u6e2c\u8a66\u65b9\u6848\uff1a3DGS \u8207 aiSim \u6df1\u5ea6\u89e3\u6790 | \u6578\u5b57\u5b7f\u751f\" tabindex=\"-1\" target=\"_blank\">\n\t\t\tRead more\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-author\">\n\t\t\tHongKeTechnology\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\tApril 14, 2026\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t<div class=\"e-load-more-anchor\" data-page=\"1\" data-max-page=\"29\" data-next-page=\"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/posts\/33713\/page\/2\/\"><\/div>\n\t\t\t\t<nav class=\"elementor-pagination\" aria-label=\"Pagination\">\n\t\t\t<span class=\"page-numbers prev\">\"<\/span>\n<span aria-current=\"page\" class=\"page-numbers current\"><span class=\"elementor-screen-only\">Page<\/span>1<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/posts\/33713\/page\/2\/\"><span class=\"elementor-screen-only\">Page<\/span>2<\/a>\n<a class=\"page-numbers\" href=\"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/posts\/33713\/page\/3\/\"><span class=\"elementor-screen-only\">Page<\/span>3<\/a>\n<span class=\"page-numbers dots\">...<\/span>\n<a class=\"page-numbers\" href=\"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/posts\/33713\/page\/5\/\"><span class=\"elementor-screen-only\">Page<\/span>5<\/a>\n<a class=\"page-numbers next\" href=\"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/posts\/33713\/page\/2\/\">\"<\/a>\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>With the EU's Cyber Resilience Act (CRA) coming into force, product security and supply chain transparency have become mandatory requirements for companies entering the European market, with the CRA requiring manufacturers to establish security mechanisms throughout the entire product lifecycle and to provide SBOM, vulnerability management, and evidence of compliance. With the gradual implementation of the EU Cyber Resilience Act (CRA), product security and supply chain transparency has become a mandatory requirement for enterprises to enter the European market, and the CRA requires manufacturers to establish a security mechanism throughout the product lifecycle and provide SBOM, vulnerability management, and evidence of compliance. The ONEKEY Safety and Compliance Platform helps enterprises to quickly complete compliance diagnosis and vulnerability management, and establish a traceable and verifiable product safety and compliance system.<\/p>","protected":false},"author":1,"featured_media":33720,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[18],"tags":[74,36],"class_list":["post-33713","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-18","tag-onekey","tag-36"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/posts\/33713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/comments?post=33713"}],"version-history":[{"count":10,"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/posts\/33713\/revisions"}],"predecessor-version":[{"id":33725,"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/posts\/33713\/revisions\/33725"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/media\/33720"}],"wp:attachment":[{"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/media?parent=33713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/categories?post=33713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aiportek.com\/en\/wp-json\/wp\/v2\/tags?post=33713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}