Contact us
Back

Multi-factor authorization technology—intelligent verification of the owner

Even the strongest digital barriers don’t consider the human factor: keys can be lost or stolen. Multi-factor authorization makes breaking into a car practically impossible.

Vulnerability

Even if a thief:

  • gained access to the cabin;
  • disabled the security system;
  • stole or cloned the standard keyfob;
  • starting the engine without additional authentication is impossible.

What our technology does

Multi-stage owner verification is performed:

  • PIN code entry using the standard buttons in the cabin;
  • presence of the owner’s personal keyfob or smartphone;
  • ability to remotely prohibit unlocking, even if the thief has the key, PIN, or keyfob.

The vehicle starts only if all conditions are met.

Why it works

Like in the banking system, if the password is stolen and there’s no second factor, access is impossible. The vehicle remains inaccessible to anyone who hasn’t passed full authentication.

Remote engine start technology—advanced algorithms for keyless bypass of the standard immobilizer via the CAN and LIN buses

Problem

To allow the engine to start, a vehicle’s standard security system (immobilizer) checks for the presence of the original key every time the engine is started—in the ignition switch or in the vehicle’s interior (in case of a keyless system).

If the key isn’t detected, the engine won’t start. Key-checking algorithms can be very complex and vary depending on the make and model of the car.

One of the main objectives in the development of modern automatic and remote engine start systems is the creation of reliable algorithms for keyless bypass of the standard immobilizer.

In other words, the autostart system must “convince” the vehicle that the key is present, even though it’s not physically there.

Previous solution

Traditionally, the bypass problem was solved in a simple way:

  • a duplicate of the standard keyfob (or its chip) was made;
  • the chip was placed in a special bypasser in the cabin of the vehicle;
  • when the vehicle needed to start, the engine “saw” the key in the bypasser and allowed it to start.

This method works, but it has a number of disadvantages:

  • additional inconvenience for the owner — they either have to sacrifice one of the issued keys or order a duplicate of it or a chip, which oftentimes is fairly pricey;
  • difficulty of installation — a bypass device must be installed, connected, and configured as part of the whole system;
  • reduced level of safety — if a car doesn’t have an independent anti-theft system (for example, AUTHOR IGLA), the presence of a permanently hidden functioning key is a serious risk.

Solution from AUTHOR

Keyless software bypass of the standard immobilizer The technology employed in AUTHOR products solves this problem at a fundamentally new level.

  • Without physical keys and chips

    No duplicates. No bypass devices. Everything is performed through a program.

  • Digital bypass via CAN and LIN

    The system interacts with the car’s standard electronic modules via digital CAN and LIN buses, imitating the original key’s presence in the car.

  • Flexibility of bypass algorithms

    Bypassing can be done in different ways, depending on the vehicle model, including preliminary calculation of the standard keyfob’s codes on AUTHOR’s server.

Why it works

AUTHOR’s expertise in digital vehicle security and its many years of research and unique developments have made it possible to create algorithms that accurately repeat or imitate the required digital signals and responses of standard electronic systems and components.

This allows car owners to:

  • ensure the engine starts correctly without interfering in the standard electronics;
  • maintain or even increase the level of vehicle protection;
  • simplify and reduce installation costs, as well as increase the reliability of the entire system.

Telematics and management — digital vehicle control technology

Car owners today have a number of demands:

  • the ability to monitor the safety of their vehicle from a distance;
  • seeing their vehicle’s current location (for example, if another driver is using it);
  • starting the engine in cold or hot weather—in advance and remotely;
  • receiving notifications when the security system is triggered or theft is attempted;
  • the ability to manage the security system’s features and quickly configure them.

Solution

The AUTHOR TELE COMPASS 2 line of telematic modules are compact devices that combine three proprietary technologies:

  • GSM/GPS beacon — detects a vehicle’s coordinates according to a schedule, which is especially important in case of an attempted theft;
  • GPS tracker—continuously tracks a vehicle’s movement in real time and records the routes;
  • Control and communication center — a platform for interaction between the security system (for example, AUTHOR IGLA, ALARM), the AUTHOR AUTOSTART module, and the owner via the AUTHOR CONNECT mobile app.

Why it works

  • AUTHOR CONNECT is a one-stop mobile app (Android/iOS) for managing all functions: arming/disarming, engine autostart, status monitoring, geolocation, event notifications, and remote engine blocking in emergency situations;
  • AUTHOR digital ecosystem is a telematic module that operates via the digital CAN bus and uses CAN-Dialog technology, the internal “communication language” of all the company’s devices. This eliminates the need for additional wires and maintains the stealth of installation and the reliability of the entire system;
  • Flexibility and scalability: AUTHOR telematics are easily integrated into any configuration of security, anti-theft, and comfort solutions. This makes it possible to create intelligent scenarios and manage a vehicle’s functions from anywhere in the world.

The AUTHOR TELE COMPASS 2 telematics system isn’t just a telematic module. It’s an intelligent digital intermediary that connects a vehicle, its owner, and the security system into a single, safe, flexible solution. It makes the car truly protected, wherever you are.

Additional digital blocking technology

Today’s thieves often resort to tampering with a vehicle’s digital network (CAN bus) and trying to bypass its standard and additional security systems. For example, if the CAN bus is intentionally disabled, only the protection built at this level can be breached.

Furthermore, in a number of vehicles, the CAN bus architecture is designed in such a way that digital engine blocking via CAN is impossible, so analog blocking must be used, i.e., connecting a relay to the main system, which often reduces the stealth of the entire security system.

We must also consider that the existence of only one blocking line creates a potential point of failure, especially during targeted hacking.

Solution from AUTHOR

Technology for additional, remotely controlled engine blocking in the AUTHOR TOR relay.

The compact, discreetly installed AUTHOR TOR relay is fully integrated into a vehicle’s standard electrical circuits and is controlled by the main system (for example, AUTHOR IGLA, AUTHOR ALARM, etc.) without additional wires directly through the vehicle’s standard electrical circuits using proprietary CAN-Dialog technology.

Why it works:

  • intelligent control: the TOR relay is controlled by digital commands via the CAN bus and responds to events defined by AUTHOR system logic;
  • reaction to attempted break-ins: in case of deliberate tampering with the CAN network (for example, short circuiting it), the relay automatically activates and blocks the engine;
  • flexibility of integration: a siren can be additionally connected to the relay. This strengthens deterrence in case of attempted theft and creates a more complex scenario for break-ins. If unauthorized access is attempted, AUTHOR TOR instantly activates the siren;
  • multi-level protection: works as primary blocking (if blocking via CAN is initially unavailable) and also as remote backup of the digital blocking of the main system, thus strengthening protection in case of attempted theft.

Wireless siren

The siren is one of the first elements that a thief targets. If it’s easy to access, it can be quickly disabled, and the wires running from it make it easy to find where the security system is installed.

Solution from AUTHOR

AUTHOR SIREN BT with wireless control technology is free of these shortcomings. It operates via an encrypted radio channel, is fully integrated into AUTHOR ALARM’s digital ecosystem, and can be installed in any hidden spot on your car. In case of attempted unauthorized access, impacts, or other alerts, it immediately gives a signal.

AUTHOR SIREN BT can also activate engine blocking via an additionally connected relay. This turns the siren into an active security element and not just a source of sound.

Why it works

The encrypted radio channel is protected against hacking, and the lack of wires from the siren to the security system makes it impossible to quickly detect and disable it. Flexibility in choosing the installation location makes the siren extremely difficult for a thief to reach. Integration with AUTHOR devices creates multi-level protection: from instant audible alarms to engine blocking.

Underhood protection technology — comprehensive vehicle security

An open hood is a direct path to vulnerable areas of a vehicle. When the engine compartment isn’t protected, it’s much easier for a thief to access the standard equipment, disable the anti-theft system, or steal expensive parts.

Solution from AUTHOR

The company offers comprehensive protection of the underhood space using the AUTHOR CONTOUR underhood module. It controls an additional electromechanical hood lock, automatically closes it when the vehicle is armed, and opens it only after authorization by the owner. You can also connect a siren and an additional engine blocking relay to the module. This turns the module into an active security element and not just a device to control the hood lock.

The CONTOUR module doesn’t operate autonomously. It receives control commands from the main anti-theft or security system (for example, AUTHOR IGLA, AUTHOR ALARM, etc.) directly through the standard electrical circuits of the vehicle, through the digital CAN bus, or using the proprietary CAN-Dialog technology.

Why it works

The technology allows you to build multi-level protection that effectively combines digital, analog, and mechanical blocking methods. This approach prevents quick access to a vehicle’s critical components and reliably combats attempts to disable the security system.

Digital blocking via CAN bus technology — comprehensive protection at the software level

To protect your car against theft, you need an anti-theft system that blocks the engine from starting or operating when the system is armed. Traditionally, this is carried out using so-called analog blocking—when the anti-theft system breaks one of the electrical circuits in the car (for example, the starter, ignition, etc.) using a relay installed in the break in the wire. As a result, the operation of a specific actuator is disrupted, and engine operation becomes impossible.

What’s wrong with analog blocking in today’s reality:

  • Low effectiveness on modern vehicles.

    Modern vehicles, as a rule, control all processes through a program via digital buses (CAN). Breaking the required wire would allow the engine to be securely blocked, but it’s difficult for security system installers to find this wire in vehicles.

  • High probability of errors and failures

    When breaking circuits using analog methods, it’s possible to disrupt the normal operation of the units, cause errors, disrupt the logic of the operation of the engine, gearbox, etc.

  • Increased risk of disabling security during theft

    Since analog blocking is performed via relay, an experienced thief can locate and bypass the protection because the number of places where a relay can be installed in a vehicle is limited.

Solution from AUTHOR

CAN blocking technologies in AUTHOR products carry out proprietary algorithms that work directly with the vehicle’s logic via its standard data buses (CAN). Unlike analog blocking, the technology doesn’t use mechanical relays and circuit breaks and allows for much more effective and reliable vehicle protection.

What is blocked:

  • Digital blocking of the engine and transmission—protection against unauthorized starting and driving.

A vehicle can start with a key, but it can’t be driven away. Digital blocking of the engine and automatic transmission operates at the level of software commands in the CAN bus. It blocks starting and driving until authorization is complete. Without authorization, the vehicle remains immobile.

  • Diagnostic exchange blocking—protection against “smart hacking” through the OBD or CAN diagnostic port.

A vehicle’s OBD diagnostic port is a “window” for a criminal. By connecting to it, the criminal starts a “dialogue” between the vehicle and their device, which can disable the standard immobilizer as well as reconfigure or reflash electronic modules with malware.

The technology creates a “blank wall” at the software level between the external device and the car’s important electronic units, preventing them from entering into a dialogue. The vehicle simply “doesn’t hear” commands from external equipment.

It’s like antivirus that isolates malicious processes before they can cause damage.

  • Anti-cloning of keys—protection against unauthorized registration of new keys.

Every vehicle is assigned unique keys. However, a thief can “add” or “rewrite” new keys through diagnostic access and steal the car.

The technology uses a program to block the procedure for working with keys, even through certified equipment and when there’s a PIN code for access to the procedure. The car simply doesn’t respond to the command to write a key.

  • Anti CAN Jack—automatic blocking of hacker commands.

The latest generation of car thieves use devices that connect to the CAN bus and send a “hacker” set of commands. This can be done even without access to the cabin, for example, from under the wing. Without any keys, the car instantly unlocks and turns on the ignition itself. All the thief has to do is get in and drive away.

Anti CAN Jack technology automatically recognizes malicious commands in the car’s data bus and blocks them. The CAN bus operates as usual, but the thief’s malicious commands run into an “invisible wall.” This is similar to an attempt to hack Wi-Fi. Algorithms constantly scan and filter the data stream, stopping fraudulent instructions.

Blocking via LIN bus technology—additional protection against unauthorized engine starts

Today’s thieves often resort to tampering with a vehicle’s digital network (CAN bus) and trying to bypass its standard and additional security systems. For example, if the CAN bus is intentionally disabled, only the protection built at this level can be breached.

Furthermore, in a number of vehicles, the CAN bus architecture is designed in such a way that digital engine blocking via CAN is difficult or impossible.

Solution from AUTHOR

The LIN (Local Interconnect Network) bus, although used to control a car’s secondary units, can be effectively used to block the engine from starting in some cases. Thanks to deep analysis of the logic of LIN interfaces and close interaction with the vehicle’s electronic units, AUTHOR engineers have developed algorithms that allow this bus to be used as an independent channel to activate anti-theft features.

Why it works

  • Independence from CAN: The LIN bus works in parallel with CAN but doesn’t depend on its operability. Even if the CAN network is disabled, LIN blocking remains active;
  • Relevant for complex architectures: In vehicles with a non-standard CAN structure, this may be the only digital way to ensure that engine start is blocked;
  • Redundant protection: Simultaneous use of CAN and LIN blocking makes a thief’s job harder by creating a backup security circuit;
  • Hidden integration: Because it operates on standard digital lines, LIN blocking doesn’t require additional wires to be run and doesn’t violate the integrity of the wiring, which increases the stealth of installation.

And so, LIN blocking technology from AUTHOR isn’t just an alternative to CAN, but a full-fledged component of multi-level digital protection that ensures reliability even in non-standard or critical situations.

It’s like a second lock that’s concealed, independent, and strong

Keyless block — technology for digital protection of keyless access systems

Today, vehicles are often equipped with a keyless access system (Keyless Entry & Go), which automatically unlocks the doors and starts the engine if the key is nearby. This is very convenient for the owner, but it creates serious risks: a thief can retransmit or imitate the standard keyfob’s signal and remain unnoticed.

Vulnerability

Retransmitting the key’s signal

Criminals use two devices (repeaters): one near the vehicle, the other near the vehicle’s owner (in a cafe, at home, in a supermarket). They “catch” the key’s radio signal and send it to the vehicle. The doors unlock and the ignition turns on.

Key cloning (code grabbing)

A special device reads the signal from the keyless access system and generates a virtual clone of the standard keyfob based on it. The car assumes this virtual key is the real one.

What risks are involved in this

  • lightning-fast unlocking and theft in a matter of seconds;
  • no obvious signs of a break-in;
  • large-scale use of this method.

What Keyless Block technology does in the AUTHOR KLB system

It creates a software “sleeping zone.” As soon as the owner steps a certain distance away from their vehicle, Keyless Block technology blocks the operation of the standard keyless access system and automatically unblocks it when the owner returns.

Why it works

When the keyless interface is “sleeping,” any external signals (repeater, code grabber) aren’t processed. The vehicle “doesn’t hear” the requests.

Contact us
*Required field
By sending an enquiry through our website, you confirm that you agree to the Privacy Policy and User Agreement